Wednesday, October 30, 2013

The Role of Fiber in Video Networks / IP Video Over OFC

As a kind of Media Converter, Fiber media converters this known as fiber transceivers or Ethernet media converters, are quite obvious networking devices those make it possible for connecting two dissimilar media types such as twisted pair Cat 5 or Cat 6 cable with fiber optic cabling. They may be essential in interconnecting fiber optic cabling-based systems with existing copper-based, structured cabling systems. Fiber ethernet media converters support many different communication protocols including Ethernet, Fast Ethernet, Gigabit Ethernet, as well as multiple cabling types such as twisted pair, multi-mode and single-mode fiber optics. Fiber media converters can connect different Local area network (LAN) media, modifying duplex and speed settings.
For video security and surveillance professionals, analog video-based CCTV systems have been the tried-and-true technology for many years. However, these same professionals are the first to recognize the migration of Ethernet into new applications beyond the typical office LAN and how Ethernet is playing a role and introducing new challenges to video security networking.
For years, Transition Networks has been talking about the benefit of fiber optic cabling and how media converters can provide a cost effective method of deploying fiber in local area networks and overcome the limitations and drawbacks of copper UTP cabling. These same benefits can be realized by security and surveillance professionals when they integrate fiber into their video networks.

For example, switching media converters can connect legacy 10BASE-T network segments to more modern 100BASE-TX or 100BASE-FX Fast Ethernet infrastructure. For instance, existing Half-Duplex hubs may be attached to 100BASE-TX Fast Ethernet network segments over 100BASE-FX fiber. When expanding the reach with the LAN to span multiple locations, fiber transceivers are useful in connecting multiple LANs to form one large campus area network that spans more than a wide geographic area.
Fiber media converters support a variety of data communication protocols including Ethernet, Fast Ethernet, Gigabit Ethernet, T1/E1/J1, DS3/E3, as well as multiple cabling types for example coax, twisted pair, multi-mode and single-mode fiber optics. Media Converter types range from small standalone devices and PC card converters to high port-density chassis systems offering many advanced features for network management.
On some devices, Simple Network Management Protocol (SNMP) enables proactive management of link status, monitoring chassis environmental statistics and sending traps to network managers in case of a fiber break or perhaps link loss on the copper port.
Fiber media converters can connect different Local area network (LAN) media, modifying duplex and speed settings. Switching media converters can connect legacy 10BASE-T network segments to more recent 100BASE-TX or 100BASE-FX Fast Ethernet infrastructure. For instance, existing Half-Duplex hubs can be linked to 100BASE-TX Fast Ethernet network segments over 100BASE-FX fiber.


When expanding the reach of the LAN to span multiple locations, media converters are of help in connecting multiple LANs to make one large campus area network that spans more than a limited geographic area. As premises networks are primarily copper-based, media converters can extend the reach from the LAN over single-mode fiber approximately 130 kilometers with 1550 nm optics.
The coaxial cabling utilized in analog CCTV networks suffers from transmission distance issues. The accepted distance for coax is 185 meters. While this has worked well in the past, the demands for increasing the surveillance coverage have pushed camera locations beyond the standard distances.
As for Ethernet and IP cameras, this distance is even more restrictive at 100 meters. Offering transmission over greater distances, fiber cabling is starting to play a signifigant role in surveillance networks. Fiber cabling supports transmission distances up to 2km on multimode fiber without the need for repeaters or signal boosters - with even greater distances available on single mode fiber.
Indoor applications with florescent lights, electric motors, and other sources of electromagnetic interference (EMI) along with sources of radio frequency interference (RFI) can cause disruptions and poor picture quality issues for video over Coax and UTP cabling. The transmission from cameras located outdoors is susceptible to these same conditions as well as the effect from electrical/lightening storms. Due to the nature of how data is transmitted over fiber optic cabling, it does an excellent job of blocking this electrical interference and protecting the quality of the data.
Wavelength-division multiplexing (WDM) technology in the LAN is very beneficial in situations where fiber is at limited supply or expensive for provision. In addition to conventional dual strand fiber converters, with separate receive and transmit ports, there are also single strand fiber converters, which can extend full-duplex data transmission approximately 70 kilometers more than one optical fiber.
 Other benefits of media conversion include providing a gentle migration path from copper to fiber. Fiber connections can help to eliminate electromagnetic interference. Also fiber media converters pose being a cheap solution for many who need it switches for use with fiber along with have enough money to pay for them, they can buy ordinary switches and make use of fiber media converters to make use of making use of their fiber network.
 As a fiber optic media converter, you can use it anywhere in the network to integrate newer technology with existing equipment to support new applications, technologies and future growth. Fiber Converters are key aspects of Optical Networking because its long distance operation, high bandwidth capacity and reliablity make fiber optics probably the most desired channel for data communications. Instead of costly, across-the-board upgrades, media converters can extend the productive lifetime of the existing cabling along with the active equipment. FiberStore offers a wide variety of professional fiber optic media converters for Fast Ethernet, Gigabit Ethernet, Serial Datacom interfaces and E1 or T1 voice/data communications.
To aid in the deployment of fiber in these security and surveillance networks, Transition Networks has specifically designed a copper to fiber media converter for analog video applications. These converters are available to support both fixed-focus cameras as well as pan-tilt-zoom (PTZ) cameras. As IP cameras begin to replace analog cameras, traditional Ethernet media converters can be used for the fiber integration. Most IP cameras also support power-over-Ethernet (PoE) technology which makes installation of the cameras easier since the camera can be powered over the UTP Ethernet cable. PoE switches, PoE injectors, and PoE media converters are all available to create the functional network needed in today’s hybrid video security and surveillance applications.

Tuesday, October 29, 2013

Hack CCTV Cameras using Google Search

Hack CCTV Cameras using Google Search

ARE YOU WILLING TO BE A HACKER THEN FOLLOW THESE EASY STEPS 

HACKING A CCTV CAMERA ITS NOT JUST A EASY ONE ,BUT I SHOW YOU VERY EASY.FOLLOW THIS STEPS

Hack The IP Based CCTV Cameras Using Google

1-open GOOGLE 
2-search any of these line in GOOGLE......! 

inurl:”ViewerFrame?Mode=
intitle:Axis 2400 video server
inurl:/view.shtml
intitle:”Live View / – AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network inurl:”ViewerFrame?Mode=
intitle:Axis 2400 video server
inurl:/view.shtml
intitle:”Live View / – AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / – AXIS”
intitle:”Live View / – AXIS 206M”
intitle:”Live View / – AXIS 206W”
intitle:”Live View / – AXIS 210?
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1? intext:”Open Menu”
intext:”MOBOTIX M10? intext:”Open Menu”
intext:”MOBOTIX D10? intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1?
intitle:”sony network camera snc-m1?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console – Web Monitor”camera snc-p1?
intitle:”sony network camera snc-m1?
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console – Web Monitor”

and u will get ip like

99.424.344.434/etc etc 

Friday, October 4, 2013

Analog CCTV storage

When buying a security DVR system on a strict budget, one of the features you will want to pay special attention to is the amount of storage that comes with your DVR. You’ll want to keep a enough archived history in case you’re out of town or away from your home / business for an extended period of time, but how much storage is enough? Do you want to gamble and keep enough storage for just a handful of days? A week? A month? The longer the time frame, the more storage you’ll need.

Key Factors Affecting the Amount of Storage Space

  • # of Days Required
  • Quality of Cameras (# of TVL / Megapixels)
  • DVR Motion Settings
  • DVR Record Rate

For the sake of argument and nice round numbers, we’ll say that a 400 TVL camera takes up 1 MB of memory per minute of recorded footage. By those numbers, a 500GB hard drive would be able to record 512,000 consecutive minutes, or 355.56 days, of completely fictional video footage. Now, let’s say we have a 600 TVL camera that occupies 2.5 MB of memory per minute of recorded footage. That means that the same 500GB hard drive will only be able to record 204,800 consecutive minutes, or 142.22 days, of fake video feeds.

Q: How do I decide how much storage capacity to allow when I'm specifying a digital video recorder?
A: There's no simple answer – every installation must be assessed individually. Key factors affecting storage are picture quality, frame rate, compression method and the length of time for which images are required.

Q: What are the picture quality options?
A: The lowest resolution now normally adopted is CIF (352X288). CIF is generally the rule of thumb when calculating storage capacity, but higher resolutions, such as 2CIF (704X288), 4CIF (704X576) and D1 (720x576), are now often specified. As a guide, CIF images recorded using MPEG4 compression are around 10Kb, 2CIF images around 20Kb and 4CIF around 40Kb. Megapixel cameras usually produce images between 80 and 200Kb each. A balance must be struck between resolution, archive time and budget.

Q: What about frame rates?
A: Always allocate frame rates appropriate to the application. Live motion is 25 full frames-per-second (fps) but each image can be 40Kb or more (4CIF). This means about 1Mb of storage per second of data from each camera – about 3.6Gb per hour. Using 12.5 fps halves storage requirements and still permits lip-sync audio. Where lip sync isn't needed, 4 fps is often acceptable, with corresponding savings in storage.

Q: How do compression methods affect the amount of storage?
A: Significantly! The challenge is to reproduce high quality, high-resolution video using the smallest amount of drive space, but remember that there are no free lunches! If a DVR claims much smaller file sizes than comparable machines with the same compression method, beware – reduced file sizes usually mean reduced quality.

Q: How long should recordings be kept?
A: This depends on the application, but don't automatically adopt the "31-day standard", a hangover from VHS tape. Digital recording is much more flexible. Discuss the options and costs with your client. In general, look at periods where video data cannot be recovered. If this happens to be 20 days, then 20 to 22 days of archive are appropriate.

Q: Is there no easier solution?
A: When in doubt, seek the advice of several professional suppliers to ensure a balanced view. Also, remember that storage is now much less expensive, so over-specifying a little won't significantly affect project costs.
If your DVR has 4SATA/6SATA/8SATA etc then your DVR can take 30days/60Days/90Days/120Days etc. You can used 1TB/2TB/4TB SATA hard Disk for storage. Capture 16-channel DVR Model: DTR4816HD has 8Port SATA.

If we use an ATX Footprint two 9U Rack Enclosures. Each one is Heavy, very nearly 100 Lbs with NOTHING in it. Each Enclosure has 50 Hot Swap Bays for Hard Drives and Two Hard Mount Locations. Today we can put 4.0 Terabyte Hard Drives (SATA-600) in there...up to 100 of them in each of the boxes These drives are SATA Drives with 128 Mb of cache on each one. Additionally, we can add two more hard drives in a hard mount. That gives us up to 400 TB of Storage. As hard drive sizes continue to grow, our storage capability increases. What was literally out of reach for many organizations just a year or so ago, is easy to attain today. You may use 8 Drive, 12 Drive, 16 Drive & 24 Drive Enclosures available.

Extra Note: By Western Digital on Date: 03/12/2014
One major component of every surveillance system is, of course, the cameras. Buyers should opt for kits that offer nothing less than a High Definition (HD) camera that can capture images at a resolution of 1,280 x 720 pixels or even a Full High Definition (FHD) camera that can capture images at 1,920 x 1,080 pixels. High resolution image capture is important as it becomes easier to spot what users are looking for when reviewing the surveillance footage – the last thing users want is for a perpetrator's face (as an example) to be a mess of indistinguishable pixels. And, whether HD or FHD, the cameras should also be able to capture images at a rate of no less than 30 frames per second (FPS). This, again, will help when it comes to reviewing crucial footage.

An equally key component of surveillance systems is the storage being used – in fact this component is what can really make or break the effectiveness of the entire system. If a system is being purchased without storage, the buyer should avoid the temptation to go out and purchase the cheapest hard drive he can find. In most cases this will be some sort of desktop drive that is not designed for 24/7 use, won't be able to capture HD or FHD video from multiple cameras without dropping frames and isn't designed to consume less power and thus generate less heat. This last point is a major concern in terms of reliability, as excessive heat can drastically reduce the life of a hard drive and can also adversely affect read and write operations when the drive is being used in the surveillance system.
A buyer should, ideally, look for hard drives that offer surveillance-relevant optimizations such as AllFrame technology, which not only improves playback performance but works with ATA streaming to reduce errors and frame loss. The drives should also be designed for 24/7 usage and offer features such as IntelliPower, which enables a drive to consume less power and thus generate less heat. This is ideal when a drive is going to be installed in a passively cooled storage enclosure, whether on its own or in-conjunction with several other hard drives.

Considering the high importance of storage in surveillance systems, vendors such as WD have introduced dedicated table-top surveillance drives that boast the aforementioned technology optimizations. The recently introduced WD Purpledrive family has been compatibility tested with hundreds of surveillance systems and offer up to 4TB of capacity on a single drive. Purple drives are uniquely designed for mainstream surveillance systems and offer the perfect blend of performance, reliability and cost - the drives are recommended for use in systems with between 1-to-8 drive bays and where between 1 to as many as 32 HD cameras are used.

Besides selecting the right type of drive, one also has to consider the amount of storage that is needed. Just how much storage is needed varies depending on the specifications of the cameras and then length of time users intend to keep your video surveillance data. The amount of time businesses maintain surveillance data varies drastically but the norm is gradually shifting from as little as 7 days to 30 days. (Certain organizations are legally required to retain data for even longer periods of time.) A general rule of thumb is the longer you are able to retain data, the better it is.

Since the video surveillance enter into megapixel IP era, the required storage capacity significantly increased, which directly increased the demands for hard disc drives.  Western Digital chose to cooperate with Hikvision to launched Purple series HDDs which are dedicated for video surveillance application. Seagate also launched ST4000VX000, which is a surveillance HDD addresses the increasing need for high-resolution cameras and camera counts, and ensures cost-effective performance and durability in always-on surveillance systems. when decide to use HDD, the first thing you want to consider is capacity. You may need to estimate the storage capacity for required video recording. Typically users opt to save costs by simply matching current capacity needs to your video surveillance demands. However, this may actually cost you more and create more upgrade issues in the long run. To choose the HDD capacity, you may take your future needs into consideration. The 4K video resolution is for times higher than your full HD 1080p resolution, which in turn, resulting in requires more than four times the amount of storage space as 1080p. Now, 500GB HDD will disappear from market, the maximum HDD storage capacity can reach up to 6TB, which can provide enough storage capacity for 64 cameras.

Do not use regular desktop computer HDDs for video surveillance. Since the working environment and condition is different, video surveillance requires a HDD that's not susceptible to the issues including heat-related failure or vibration from other drives, which can result in loss of video frames, data loss. What's the difference between regular computer HDD and surveillance dedicated HDD? Compared with computer HDD, surveillance dedicated HDD are designed for 90% write time and only 10% read time. The surveillance-specific drives are also engineered to reliably perform in multi-drive systems with RAID support. Optimized performance and reliability can minimize the effect of vibration from other drives with RV sensors, which mean fewer points for potential failure.

Here we have provided Storage size of Cameras in GB per Day according to their Formats H.264 Compression.

Resolution
Storage Per Day in GB
1 MP
 25-30 GB Aprox
2 MP
 35-40 GB Aprox
3 MP
 60-65 GB Aprox

Thursday, September 26, 2013

Proactive Maintenance

Buildings and business operations rely on critical equipment to function. While this may differ between industry sectors and business operations, for instance within manufacturing where machinery is mission critical or within a high-rise office park where air conditioning is vital, the fact remains that without this equipment, the business would be unable to function.
Maintaining this equipment then is a matter of some importance, and a proactive building maintenance strategy cannot only help to manage expenses by prolonging the lifecycle of equipment, but can also reduce the likelihood of this equipment failing without warning, causing loss of productivity and potentially causing disruption, depending on the nature of the machinery.
However, intrusive equipment maintenance may not be necessary, as it can cause problems of its own, including loose connections, shortened equipment life and actually introducing points of failure where they may not have existed before. Infrared testing is one method of proactive maintenance that circumvents this issue, since it is non-invasive and can help to identify if there are any problems with equipment without physically examining it.
This method can be used on any equipment that generates a heat profile when in operation, including the main electrical infrastructure, critical electrical equipment, transformers, switchgear, transmission lines, distribution boards, motors, compressors, boilers, air conditioning systems, lighting and other electronic devices. Using infrared testing, it is possible to run diagnostics and identify points of failure through variations in temperature profiles without physically touching the equipment.
Infrared advantages
This has several advantages. Testing can be conducted in real-time at peak operational times, without the need to switch equipment off and disconnect it, enabling inspectors to verify and monitor operational aspects on equipment. The infrared testing also provides a visual overview of the status of the equipment. Being highly sensitive, it can pick up even the smallest anomalies which may indicate points of failure. These can then be checked against benchmark thermal profiles for particular equipment to determine if action needs to be taken.
This method can be used effectively on equipment that is dangerous to get physically close to, such as high voltage equipment. It allows diagnostics to be conducted on a wider variety of machinery. It also enables remote inspections on critical equipment and equipment that is difficult to access, since an infrared tester can be installed on the machines themselves for constant monitoring.
Infrared and other non-invasive techniques are more cost and time effective than traditional maintenance methods and enable proactive programming to be developed based on the data obtained from monitoring equipment. This can then help to identify future points of failure, improve the longevity of equipment, and create a managed environment which is far more effective in the long term than a reactive approach.
However, proactive maintenance should always be combined with a tailored maintenance strategy that is specific to the needs of an individual building or the business as a whole, linked in with the financial performance and strategy of the organisation. There is no ‘one size fits all’ approach when it comes to building maintenance, and this strategy should balance the risk associated with failing equipment with the cost associated with maintenance.
The correct strategy
Some organisations require constantly running equipment, whereas others can withstand a certain amount of downtime, which should be considered in the maintenance strategy. In some instances, running equipment to failure may be the most cost effective option, so this must also be taken into account, along with legislated scheduled maintenance on certain equipment such as fire prevention systems, elevators and escalators, vessels under pressure and load equipment. These must be maintained at specified intervals for insurance, warranty and legal purposes.
When it comes to developing a maintenance strategy, it is useful to work with a specialised outsource provider who can help organisations to determine how to maintain equipment and drive this. Each client and environment is unique, so the approach should be tailored based on a basic strategy outlined which can then be refined by the service provider to deliver the best solution for an individual environment.
Proactive monitoring and maintenance can be a complex and expensive process to bring in-house, due to the cost of labour and equipment, the specialised skills needed and the part time nature of this type of job. Outsourcing this process to an experienced service provider will not only ensure that organisations can leverage economies of scale and access a cost effective service. It will also provide assurance that the provider will have the most up to date knowledge of what points of failure to look for across different equipment, as well as the latest information, equipment and technology to provide the best levels of service.
Maintenance of buildings and the variety of equipment they contain is a vital part of running any successful business. By defining the maintenance strategy correctly and adopting the right mix of proactive and reactive maintenance, organisations can save money, prolong the life of equipment, managing both operational and reputational risk through an intelligent process that matches the finances, needs and strategy of the business as a whole.

Saturday, September 7, 2013

What is the Registry

What is the Registry?

The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, NT/2000, Windows ME, Windows XP, Windows Vista and Windows 7 operating systems. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

However, just like every other part of your computer, your registry needs occasional cleaning and reorganization. Using a top-rated registry cleaner will help you clean your computer registry painlessly.

Friday, September 6, 2013

Linux VS. Windows DVR

There are two different types of surveillance DVRs – those that run on a Windows operating system, and those that run on a Linux operating system.  Years ago, the Linux DVRs were more reliable due to weaknesses in the Microsoft ME operating system.  However, due to the stability of Windows XP, both types of products are now equally as reliable when it comes to the core operating system.  However, due to large inadequacies that exists in the hardware construction and DVR software design of Linux type DVRs, Windows DVRs have become the clear choice for most surveillance applications.
So…. what exactly is a “stand-alone? surveillance DVR?  Frankly, we don’t know who coined the term.  However, we do know that it is highly misused and misunderstood.  The fact of the matter is that both Windows and Linux style DVRs are similar in hardware design.  Both style DVRs require a main board (motherboard), processor, RAM, a graphics card, video processing chip, network adapter, and storage hard drive.  However, a main, and very critical, difference is that most all Linux DVRs put all required hardware on a single board.  This creates a situation whereby once a single component on the main board fails, that the product is commonly rendered useless.  And since the main selling point of Linux DVRs is their low price-point, they are very commonly constructed as economically as possible typically using below-par unskilled labor and manufacturing techniques.
 
 
Unlike Linux style DVRs, Windows DVRs are almost always constructed of mainstream hardware components.  These components are most always of higher quality than those found in Linux DVRs.  Perhaps even more importantly, they are also readily available from most any computer or consumer electronics store.  Therefore, if a hardware failure is recognized in a Windows DVR, it should be relatively easy to quickly find an inexpensive replacement part to repair the problem.  The only exception would be the actual multi-capture PCI card.
 
Hardware Bottom Line… Windows DVRs typically utilize higher quality hardware components that are readily available in the event of failure.  In the event of component failure in a Linux style DVR, the entire unit typically has to be sent back to either mainland China, Taiwan, or South Korea for repair (if still under warranty).
 
 
Software design, reliability, usability, and overall practicality differences between Windows DVRs and Linux DVRs are also greatly different.  Although there are many grades of surveillance software that drives Windows-based DVRs, overall, even moderately well designed Windows DVR software will almost always out perform that found in Linux-based DVRs.  Simply, it’s a matter or usability as most all Linux DVRs operate off of deep menu-driven controls rather than being point & clickable with a PC mouse.  Although low level controls like start, stop, play, etc can typically be easily controlled via the front panel on a Linux DVR, other important functions like camera set-up, record scheduling, motion detection control, video searching, and so on are typically controlled via difficult to use menus.  Even worse, many features like advanced motion detection zoning and automatic user notification via phone, fax, or beeper when motion is detected are not even available on most all Linux DVRs.  Perhaps even of greater concern is that most Linux DVRs use open source surveillance software that is not properly tested for commercial surveillance applications.
 
 
Software Bottom Line… Windows-based DVRs are easier to use and offer greater features than Linux style DVRs. 
So, when is a Linux style DVR a better choice?  Given that the hardware is typically manufactured on a single board and the Linux operating system being free of charge, Linux DVRs do typically cost considerably less than Windows DVRs.  Provided that cost is a greater issue than system reliability, ease of use, and features, Linux DVRs are a very viable option.  Although Linux DVRs have their shortcomings when compared to Windows DVRs, the fact remains that they are typically by far a better and more viable option than any Analog CCTV system (time lapse vcr, multiplexer, etc).
 

Thursday, August 29, 2013

Popular Surveillance Cameras Open to Hackers

Popular Surveillance Cameras Open to Hackers

In a world where security cameras are nearly as ubiquitous as light fixtures, someone is always watching you.
But the watcher might not always be who you think it is.
Three of the most popular brands of closed-circuit surveillance cameras are sold with remote internet access enabled by default, and with weak password security — a classic recipe for security failure that could allow hackers to remotely tap into the video feeds, according to new research.
The cameras, used by banks, retailers, hotels, hospitals and corporations, are often configured insecurely — thanks to these manufacturer default settings, according to researcher Justin Cacak, senior security engineer at Gotham Digital Science. As a result, he says, attackers can seize control of the systems to view live footage, archived footage or control the direction and zoom of cameras that are adjustable.
“You can essentially view these devices from anywhere in the world,” Cacak said, noting that he and his security team were able to remotely view footage showing security guards making rounds in facilities, “exceptionally interesting and explicit footage” from cameras placed in public elevators, as well as footage captured by one high-powered camera installed at a college campus, which had the ability to zoom directly into the windows of college dorm rooms.
Cacak and his team were able to view footage as part of penetration tests they conducted for clients to uncover security vulnerabilities in their networks. The team found more than 1,000 closed-circuit TV cameras that were exposed to the internet and thus susceptible to remote compromise, due to inherent vulnerabilities in the systems and to the tendency of the companies to configure them insecurely.
The inherent vulnerabilities, he said, can be found in at least three of the top makers of standalone CCTV systems that he and his researchers examined — MicroDigital, HIVISION, CTRing — as well as a substantial number of other companies that sell rebranded versions of the systems.
CCTV video surveillance systems are deployed at entrances and exits to facilities as well as in areas considered to be sensitive, such as bank vaults, server rooms, research and development labs and areas where expensive equipment is located. Typically, the cameras are easily spotted on ceilings and walls, but they can also be hidden to monitor employees and others without their knowledge.
Obtaining unauthorized access to such systems could allow thieves to case a facility before breaking into it, turn cameras away from areas they don’t want monitored or zoom in on sensitive papers or prototype products at a workstation. The cameras could also be used to spy on hospitals, restaurants and other facilities to identify celebrities and others who enter.
Remote access capability is a convenient feature in many of CCTV systems because it allows security personnel to view video feed and control cameras via the internet with laptops or mobile phones. But it also makes the systems vulnerable to outside hackers, particularly if they’re not set up securely. If the feature is enabled by default upon purchase, customers may not know this is the case or understand that they should take special steps to secure the systems as a result.
“All the ones we found have remote access enabled by default,” Cacak says. “Not all the customers may be aware [of this]…. Because most people view these via console screens, they may not be aware that they can be remotely accessed.”
Compounding the problem is the fact that the systems come deployed with default easy-to-guess passwords that are seldom changed by customers. They also don’t lock-out a user after a certain number of incorrect password guesses. This means that even if a customer changes the password, an attacker can crack it through a bruteforce attack.
Many of the default passwords Cacak and his team found on CCTV systems were “1234″ or “1111.” In most cases the username was “admin” or “user.”
“We find about 70 percent of the systems have not had the default passwords changed,” Cacak said.
Because many customers who use the systems don’t restrict access to computers from trusted networks, nor do they log who is accessing them, Cacak said owners often cannot tell if a remote attacker is in their system viewing video footage from outside the network.
To help companies determine if their CCTV systems are vulnerable, Cacak’s team worked with Rapid7 to produce a module for its Metasploit software targeting CCTV systems made by MicroDigital, HIVISION and CTRing or sold by other companies under a different name. Metasploit is a testing tool used by administrators and security professionals to determine if their systems are vulnerable to attack, but it’s also used by hackers to find and exploit vulnerable systems.
The module can determine if a specific user account, such as “admin,” exists on a targeted CCTV system, and it can also conduct automatic log-in attempts using known default passwords, brute force a password crack on systems using unknown passwords, access live as well as recorded CCTV footage, and redirect cameras that are adjustable. HD Moore, chief security officer at Rapid7, said they’re working on a scanner module that will help locate CCTV systems that are connected to the internet.
Earlier this year, Moore and another researcher from Rapid7 found similar vulnerabilities in video-conferencing systems. The researchers found they were able to remotely infiltrate conference rooms in some of the top venture capital and law firms across the country, as well as pharmaceutical and oil companies and even the boardroom of Goldman Sachs — all by simply calling in to unsecured videoconferencing systems that they found by doing a scan of the internet.
They were able to listen in on meetings, remotely steer a camera around rooms, as well as zoom in on items in a room to read proprietary information on documents.
Cacak said that customers using CCTV systems should disable remote access if they don’t need it. If they do need it, they should change the default password on the systems to one that is not easily cracked and add filtering to prevent any traffic from non-trusted computers from accessing the systems.