Friday, December 25, 2009

Mobile & Remote Video Surveillance Camera Systems

Customers often ask how to access a live view of their remote security cameras when they’re away from their home or business. After all, people lead busy lives, come in and out of work, go on vacations, and run errands so investing in a remote video surveillance system is crucial to the well-being and safety of your home or business. Thus, much of the time you’re not actually able to be onsite where your cameras are installed. One of the primary benefits of IP video is that you’re not limited to viewing your remote video surveillance system on site. The advancements in video surveillance technology have made it possible to view your remote security camera from any internet-enabled PC or smartphone. VideoSurveillance.com has outlined the key components of remote security camera system and video surveillance app, everything you need to know in order to start viewing your security cameras off-site.
What is Remote Video Surveillance?
Remote video surveillance enables users to view live video on a PC or laptop from just about anywhere in the world with internet access. To facilitate remote viewing, you simply type in the IP address of your network security camera in your internet browser like you would a website. This is done through DDNS and port-forwarding, which is discussed in greater detail further below. Once you’ve configured DDNS and port-forwarding and have obtained an IP address to view online, you can then begin to experience what it’s like to view your security camera system from a remote location. Remote security cameras are typically compatible with a wide range of web browsers. It is worth noting that specific web browser support varies by manufacturer.
What is Mobile Monitoring?
Remote mobile video surveillance takes remote monitoring to a whole new level. Several IP camera manufacturers offer complimentary mobile surveillance apps that give you the ability to view and manage your security cameras from a smartphone or tablet such as the iPhone, iPad, or Android. Many of these security camera apps allow you to view multiple cameras simultaneously, control PTZ settings, view recorded images, search through archived footage, play back events, and much more. Just like you would view your security camera(s) on a remote PC/laptop, you will need to have an internet data plan and IP address to do so. Remote video surveillance is perfect for users who are often off-site, and therefore not able to be on the local computer system where their IP cameras are connected.
What’s the Difference between Remote and Mobile Video Surveillance?
The common denominator of remote monitoring and a security camera app is online viewing. The main differences between the two are usability features. Remote monitoring tends to give you greater control over your camera system when it comes to managing settings and recording video. If you’re checking up on your business cameras from your home or hotel on a PC or Mac, you usually have a more reliable and secure internet connection.
A mobile security camera app requires a smartphone data plan, and may lose connection from time to time in no-coverage zones. It’s also a matter of personal preference – if you use the internet primarily on your smartphone, then mobile surveillance may be the right choice for you.
How can Remote Video Surveillance and Mobile Monitoring Help You?
Remote security camera monitoring and mobile surveillance do not require you to be “on location” in order to view and manage each of your security cameras. You’re not limited to monitoring just one camera remotely; most video surveillance apps provide simultaneous viewing and multi-site options so you can check up on all of your remote security cameras in your business or home. Monitoring off-site is also extremely convenient for users as it gives them the freedom to come and go as they please without having to worry about their property. For example, mobile and remote monitoring is great to have when you’re on vacation. If you’ve got two or three IP cameras installed at your home, and decide to take a trip somewhere, you can still monitor your property and receive email notifications if your cameras detect motion or tampering. Essentially, remote video surveillance makes it so you don’t have to be at the exact location of your security cameras to keep a watchful eye on your property. In addition, remote monitoring works wonderfully with pet cams, nanny cams, and pool cams. You’re not limited to what you can view. Surveillance on the go has never been easier.
Features
View Live Stream - Real-time video display is a primary selling point for remote and mobile monitoring. Having direct access to your live camera feed gives you the power to monitor your property without actually being there.

View NVR Live Stream - Some NVR manufacturers offer remote web interfaces and video surveillance apps that provide remote access to your IP camera system. These Internet-based platforms give you instant access to live camera displays and recorded video footage that work on PCs, and some smartphones. You simply log on to the NVR’s web interface or app to facilitate real-time monitoring.

View Recorded Video from your camera/NVR - Another benefit of remote monitoring and mobile surveillance is with some mobile apps and NVR web interfaces, you can view recorded video. This is especially helpful when you’re on vacation; you can review recorded video and decide if it’s relevant or not, or notify law enforcement if you come across something suspicious that was captured on video.

Images are sent to your phone, on motion or schedule - You can configure your IP camera so that images are sent directly to your email account or smartphone via message MMS if motion, tampering, or vandalism is detected. Images can also be sent on a schedule to keep you abreast of what your video monitors.

Send images to email account - With video management software, you can configure your security cameras to send email alerts to your smartphone, iphone or email account for evidentiary purposes and as a way to archive footage deemed important.

Administer VS System remotely - You can do a lot more with mobile and remote monitoring than just viewing live video. A number of IP camera and NVR brands offer web interfaces and cloud services that can be accessed from remote locations. These online platforms allow you to control the settings and configure your IP camera system like you would onsite.
How Do You View Your Video Surveillance Cameras Remotely?
In order to monitor your video surveillance cameras from a remote device like a PC or smartphone, you will typically need to set up DDNS and port forwarding.
DDNS - With video management software, you can configure your security cameras to send email alerts to your smartphone, iphone or email account for evidentiary purposes and as a way to archive footage deemed important.

Port-Forwarding - When you purchase your IP camera system, you’re at first limited to viewing your cameras locally, meaning you can only access them in a local area network. To view your cameras remotely, you must configure port-forwarding. Port-forwarding sends network ports used by your IP camera(s) onto the World Wide Web so that you can monitor your cameras remotely. Network ports are typically forwarded through your network’s router, which tech support specialist at VideoSurveillance.com can help you with. Port-forwarding can only be set up by obtaining the IP address of your router that connects to your video surveillance cameras. It should be noted your IP cameras and NVRs are still secure when accessed via the Internet because of password protection.

Special Plug-and-Play Solutions - Some NVR manufacturers such as Smartvue offer online cloud services that allow you to access your video surveillance system from a remote location by simply logging into your cloud account. Once logged in, you can view your live video feed, manage settings, and search recorded video as needed.

Conclusion

What makes remote video surveillance and mobile monitoring so favorable is that they both fit within your busy schedule. Remote monitoring and mobile surveillance give you on-the-go, real-time access to your live camera view so you can check up on your property anytime, day or night. The remote solutions made available by IP camera, NVR manufacturers, and even third-party mobile app developers are manifold; it is up to you to decide which one best aligns with your day-to-day routine.

Saturday, December 19, 2009

Several factors go into deciding which configuration is best for your needs.

These 3 are the first key factors to consider.

1st - Recording Speed - FPS (Frames Per Second) While each camera has the capability of recording up to 30FPS, (considered "Real Time"), the computer card's capacity will limit each camera's capacity. Card capacities are 30, 60, 120, 240 & 480 FPS. If you connect 4 cameras to a 30FPS card, each camera will max out at 7.5FPS, resulting in a very jerky motion. 4 cameras would require a 120FPS card in order to get the full potential out of each camera ("Real Time").
2nd - Resolution of record and playback
While many systems may have a recording resolution of 640x480 lines, they may only have
a playback of 320x240 lines, making playback not as clear as you might expect.
3rd - Total capacity of the hard drive.
Each camera recording at 30FPS requires about 1.5 GIG of hard drive space per 24 hours.
For a full 30 days, 4 cameras at full capacity would require a hard drive with a minimum of
180 GIG available space for data storage, not including the operating system or software.

Before you buy - be sure you will get what you expect!

Straight and Crossover cable

What are Straight and Crossover cable
Dear All CCTV, Access Control Technician/Engineer now make clear on this Two type of CAT Cable. Common Ethernet network cable are straight and crossover cable. This Ethernet network cable is made of 4 pair high performance cable that consists twisted pair conductors that used for data transmission. Both end of cable is called RJ-45 connector.

The cable can be categorized as Cat 5, Cat 5e, Cat 6 UTP cable. Cat 5 UTP cable can support 10/100 Mbps Ethernet network, whereas Cat 5e and Cat 6 UTP cable can support Ethernet network running at 10/100/1000 Mbps. You might heard about Cat 3 UTP cable, it's not popular anymore since it can only support 10 Mbps Ethernet network.


Straight and crossover cable can be Cat3, Cat 5, Cat 5e or Cat 6 UTP cable, the only difference is each type will have different wire arrangement in the cable for serving different purposes.

Straight Cable

You usually use straight cable to connect different type of devices. This type of cable will be used most of the time and can be used to:
1) Connect a computer to a switch/hub's normal port. 
2) Connect a computer to a cable/DSL modem's LAN port.
 
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
 
4) Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
 
5) Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other one using normal port.

If you need to check how straight cable looks like, it's easy. Both side (side A and side B) of cable have wire arrangement with same color. Check out different types of straight cable that are available in the market.

Crossover Cable

Sometimes you will use crossover cable, it's usually used to connect same type of devices. A crossover cable can be used to:
1) Connect 2 computers directly. 
2) Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding network)
 
3) Connect 2 switches/hubs by using normal port in both switches/hubs.

In you need to check how crossover cable looks like, both side (side A and side B) of cable have wire arrangement with following different color . Have a look on these crossover cables if you plan to buy one. You can also find more network cable choices and information from Comtrad Cables.
In case you need to make a crossover cable yourself! You can use crimperDescription: http://www.assoc-amazon.com/e/ir?t=homnetwirneta-20&l=ur2&o=1 to do it.

Lastly, if you still not sure which type of cable to be used sometimes, try both cables and see which works.

Note: If there is auto MDI/MDI-X feature support on the switch, hub, network card or other network devices, you don't have to use crossover cable in the situation which I mentioned above. This is because crossover function would be enabled automatically when it's needed.


Sunday, December 13, 2009

Digital revolutionizes video surveillance
With the Internet revolution and the ever-increasing presence of Local Area Networks, technology took great strides in video surveillance in the 1990’s. Analog camera tubes were replaced with CCD (Charged Coupled Devices) and digital cameras became affordable for most people.

This combination meant that video surveillance could do two things: go live over the Internet or a closed network for surveillance and provide clearer, crisper images that could be tracked and manipulated easily. For law enforcement, digital surveillance meant it was much easier to zoom in on images, track particular scenes and enhance features.

A digital camera “views” the scene in front of it, broadcasts the video images as a digitized signal over a LAN line (Local Area Network) where it’s then transmitted to a computer or server. The server in turn manages all of this information. Depending upon the software used to manage the digital images, it can record, display or retransmit the images to anywhere in the world.

The software package can easily be upgraded to allow for analyzing data, selecting specific “flagged” items to watch for and a host of other functions, making it a truly customizable security tool.

True IP-based digital surveillance uses CCD cameras that use signal processing that send packetized video streams over the LAN through a Cat 5 cable rather than a coax cable network, utilizing greater bandwidth and standard TCP/IP communication.

It also provides more intelligent data mining and information retrieval. If security is an issue, full digital surveillance also offers the added advantage of data encryption opportunities to protect against image tampering -- something not possible with analog recording.

Saturday, November 28, 2009

What is Fire Alarm System in short ?

Fire Alarm System
Fire alarm systems have been specially designed to alert people about fire at the earliest. From single to multi zone i.e. in a building (single) or in different floors of the building (multi-zone). These can also be installed in drawing rooms, bed rooms etc.There are basically three types of fire alarm systems, the functional advantage being that the source of fire is immediately detected and isolated which enables immediate corrective action.

STANDARD FIRE ALARM SYSTEM
These are designed to meet the fire requirements in the buildings, with LCD Display in conventional panel as a latest Technology.

ANALOGUE FIRE ALARM SYSTEM
These are also microprocessor based systems which work on the principle of extended loops and are suitable for large premises. The system gives LED indications in the control panel thereby isolating the source of fire.

ADDRESSABLE FIRE ALARM SYSTEM
These systems give LCD displays which show the exact location of all the detectors room-wise (for example computer room, drawing room etc.) from where fire has started.

SMOKE DETECTORS
lonisation smoke detectors: These help in the fast detection of both visible and invisible smoke particles in the range of 0.01 mm to 1 mm.
Optical smoke detectors: It provides early warning of a fire condition and is particularly effective in case of slow burning fires such as bedding, foam and plastics. This micro-processor system is suitable for small & medium size premises as it enables to isolate the source of fire, immediately.
HEAT DETECTORS
Heat detectors may be "fixed temperature type (which respond to temperature) or the "rate of rise" type (which respond to sudden increase of heat).
SMOKE AND HEAT BEAM WITH LOW LEVEL INDICATOR
These instruments are used to find the level of fire or smoke in a particular area. They can cover greater area and are suitable for high ceilings such as conference, cinema halls etc.
MANUAL CALL POINT & RESPONSE INDICATORS
Manual call point are earlier forms of fire alarm systems with the message " In case of fire break glass".Response indicators identify the source of fire in a room/false ceiling through LED display, enabling corrective action.
SOUNDERS OR FLASHERS
These are extremely useful in the night where there is no natural light. Sounders emit piercing alarm like sound from the place of fire and flashers get working to indicate the source of fire.
ADVANTAGES GALORE
* Ideal for hospitals, high-rise building, offices, godowns, home and factories.
* Easy to install
* Extremely effective
* Advanced electronic technology
* Constant alarm current

Friday, November 27, 2009

Do You Know How & When to Use a Fire Extinguisher ?

Do You Know How & When to Use a Fire Extinguisher ?
10 Important Rules to Remember................

1. Most fires start small. Except for explosions, fires can usually by brought under control if they are attacked correctly with the right type and size of extinguisher within the first two minutes!

2. A fire extinguisher should be "listed and labeled" by an independent testing laboratory. The higher the rating number on an A or B extinguisher, the more fire it can put out. Be careful, high-rated units are often heavier models. Make sure you can hold and operate the model you are buying.

3. A portable fire extinguisher can save lives and property by putting out a small fire or containing it until the fire department arrives. Before attempting to fight a small fire be sure everyone is out of the building. It is important to have someone call the fire department. If the fire starts to spread or threatens your escape path, get out immediately!

4. The operator must know how to use the extinguisher, quickly without taking time to read directions during an emergency. Remember that the extinguishers need care and must be recharged after every use.

5. PULL... Pull the pin. Some extinguishers require releasing a lock latch, pressing a puncture lever or other motion.

6. AIM... Aim low, pointing the extinguisher nozzle (or it's horn or hose) at the base of the fire.

7. SQUEEZE... Squeeze the handle. This releases the extinguishing agent.

8. SWEEP... Sweep from side to side at the base of the fire until it appears to be out. Watch the fire area in case fire breaks out again, and repeat use of extinguisher if necessary.

9. Most portable extinguishers work according to these directions. But some do not. Read and follow the directions on your extinguisher. If you have the slightest doubt about whether or not to fight a fire - DON'T! Get out and close the door behind you.

10. Ask your fire department about training and practice in the use of portable fire extinguishers. Many departments offer training sessions to the public

Monday, November 9, 2009

Wireless CCTV (WCCTV)

Wireless CCTV has recently been presented with a Queen's Award for Enterprise, in the category of Innovation for 2009. The continuous development of WCCTV’s high-tech Wireless Dome Camera systems and its socially responsible ethos have earned the Company recognition amongst the UK's business elite.
In 2007, the Home Office Scientific Development Branch rewarded Wireless CCTV with an Award for Equipment & Technology Innovation .

Wireless CCTV’s new 3G body-worn solutions have been developed in order to satisfy
the growing demand for body-worn surveillance equipment whether that equipment is
covert or overt.
The 3G body-worn solutions strongly improve security for agents in the field and allow supervisors to coordinate tactical operations involving multiple agents, while reducing the need for paperwork. Wireless CCTV has developed a range of overt solutions such as the Camera Vest and Belt options.
The WCCTV 3G Covert Backpack is ideal for agents who need evidential quality recording of suspects on the move. The backpack houses all of Wireless CCTV’s bodyworn technology in a covert package. The central unit of the body-worn equipment uses a robust Compact Flash card for digital, evidential quality recording of agents’ video and audio footage. Using 3G mobile phone technology, images and sound can be remotely monitored by a supervisor, who can evaluate the situation in real-time and despatch assistance or advise the agent on possible courses of action.
Wireless CCTV has also integrated an optional GPS receiver which tracks and maps the exact location of agents in the field. The precise position of multiple agents, combined with their respective live video and audio feeds, allows supervisors to assess a situation in real-time and make decisions accordingly.
A Panic Alarm button allows agents to notify the supervisor that they need immediate assistance.At the end of an operation, data can easily be backed up for evidential purposes, reducing the need for paperwork.

Each Wireless CCTV system is a completely portable, mobile unit that delivers live images directly to a PDA, PC, laptop or dedicated monitoring station via 3G mobile phone technology, broadband and wireless LAN networks, free from most geographical restrictions.


Wireless CCTV manufactures overt and covert systems which can be located anywhere, can be worn or even fitted into a vehicle, making this equipment ideally suited to combating crime in virtually any location.

For more details on some of the remote surveillance and rapid deployment monitoring solutions that Wireless CCTV provides to address specific problems, and to offer security at a wide variety of sites, please click on the relevant information link below.

CCTV monitoring of:

Anti social behaviour
Fly tipping
Traffic Congestion
Construction Sites
Covert operations

We also provide Wireless CCTV Case Studies , supply product data sheets with descriptions of individual systems - including visuals and technical specifications - and headline the latest news .

Our news reports cover successful Wireless CCTV applications that are meeting the challenges of vandalism , fly-tipping and anti-social behavior as faced by different Local Authorities and Housing Associations at locations across the UK.

For an incredibly flexible, ready to go, and completely secure solution, that can be up and running almost anywhere in less than one hour when necessary, we are confident you will find no better examples of success, and no better choice to make. In our experience, the only technology to meet every expectation, every time, is Wireless CCTV.

HEAVY DUTY WIRELESS DOME

WCCTV’s 3G Heavy Duty Dome Camera System has been designed for use in the harshest of environments. It provides the user with complete flexibility and portability. The Dome system has an integrated camera and transmission unit offered as a 'one box' solution.The system is ideal for rapid installation and temporary surveillance applications; it can be deployed in any location however harsh or remote. The Metal Mickey camera which is integrated into the unit is extremely robust and can operate in the most arduous of conditions. It is shotgun resistant, has an 18x or 36x optical zoom function and has a flat optic viewing window with wiper, to give distortion free images.
Transmission methods:
The variety of cutting edge transmission methods provided by WCCTV makes the product portfolio extremely flexible and cost effective. WCCTV utilise their expertise in telecoms and CCTV to provide state of the art products and systems which are capable of operating over multiple remote transmission media.
Every WCCTV product contains 3G HSUPA mobile phone technology, plus an additional transmission medium to maximise flexibility and portability. This unique approach provides the ability to transmit fluid, high-resolution images wirelessly without geographical restrictions, making WCCTV ideal for covert operations and short term covert monitoring.
Each WCCTV system also has an IP address allowing it to utilise broadband technology, which offers high-speed, fixed-cost transmission networks for live 24/7 monitoring. Broadband technology is ideal for remote covert surveillance where there is access to a telephone line with broadband connection.
The 3G Heavy Duty Wireless Dome system has Wi-Fi technology built in as standard, which enables high speed downloads up to 100m away using a Wi-Fi enabled laptop. As an optional extra it is possible to request long range Wi-Fi, which enables live monitoring up to 2km (line-of-sight) away from a broadband access point. Users are able to dial in remotely and access live images or stored digital footage from the integral hard drive. The camera itself can be controlled remotely with full pan, tilt and zoom functionality and a 360° field of vision.

Transmission speed
Via 3G HSDPA
Up to 12 frames per second
Via 3G UMTS
Up to 6 frames per second
Via GPRS
Up to 3 frames per second

Software
Wireless CCTV's Single View Software is free, unlicensed and allows multiple users.
> Up to 6 concurrent connections
> Event recording
> Password protected
> Full archive & playback facility
WCCTV's Multicast Software allows the end user to monitor up to 9 sites simultaneously, while WCCTV’s Server Software allows control room integration.

Monitoring
Using the WCCTV monitoring software from any laptop or PC, a supervisor can view an
agent’s live or previously recorded images. Combining this information with mapping
software, which shows the agent’s position at all times, a truly global overview of the operational status of agents in the field can be obtained.

Possible applications

Wireless CCTV’s 3G body-worn solutions are ideal for offering evidential quality video recording to agents in the field. The recorded, or live, video and audio can be
monitored from a laptop or PC by a supervisor. GPS tracking allows supervisors to monitor the location of agents while the 2-way audio allows to assist agents with real time advice. The Panic Alarm Button can be used by agents to notify the control
room that they need immediate assistance.
Some other possible applications may include:
> Fighting anti-social behaviour
> Close quarter surveillance
> Operations involving multiple agents
> Optimising the geographical deployment of agents by monitoring their location
> Reducing reporting paper work
> Assisting agents in the field with advice in real time

Features & benefits
> Truly portable surveillance solution
> Digital evidential quality recording
> 3G (with automatic GPRS fallback) guarantees virtually unrestricted geographical coverage
> Instant re-deployability
> Track and map agents' locations at all times
> Panic Alarm Button notifies control room instantly

Anythings more mail me : bhadra_1980@yahoo.com

IP camera Software

EyeSoft is known as the best IP camera software solution featuring an open source structure with hybrid support for multi-vendor IP CCTV cameras from Axis, Arecont, Acti, BiKal, Panasonic, Samsung, Sony, Pelco Toshiba & more to USB Webcams, analog capture cards and IPTV streams. EyeSoft is simple to use and has an easy to manage software interface which is suitable for the home, power and enterprise user.

Advanced IP Camera Surveillance software allowing the user to view up to 64 cameras on a single screen with multi split screen views of 1, 4, 9, 13, 16, 36 and 64 cameras. Floating panels allow simultaneous monitoring of system health, e-map, alarms, playback & live video all at once. Virtual Matrix allows connection of up to 8+ monitors per PC for flexible & pro-active video monitoring. NEW digital zoom feature.
IP Camera Software Features
  • System Operation
  • 4ch, 8ch, 16ch, 32, 64 channel version supporting Windows XP, Vista, 7, Server08, 32/64+ bit
  • 4ch, 8ch, 16ch LITE version, software bundle for ip cameras, PC's, media/telco services
  • Software records IP cameras from multiple camera manufacturers
  • Supports USB webcams, Analogue capture cards & IPTV streams
  • MegaPixel IP Camera support up to 1920x1080 HD, frame rate up to 60 fps per camera
  • Dual Video & Audio stream capture per camera (where supported)
  • Connect to multi-sites or servers for scaleable system of many cameras & sites
  • Windows Media, MPEG4, MJPEG, H.264, .ASF compliant
  • Customize recording bandwidth & outgoing bandwidth for each camera
  • RS-232 & Digital I/O support, external audio support
  • PTZ presets, tour support, Sequence & Pelco D PTZ keyboards via RS232
  • Multi Level password access, authentication
  • English, French, German & Finnish Languages
  • Live Monitoring
  • Simple user interface with numbered camera buttons or detailed tree view
  • 4/8/16/32/64ch split screen views, view cameras at once all or split into groups
  • Split cameras into groups, customise each group view, sequence groups
  • Multi monitor Virtual Matrix supports up to 6 monitors per client / server / PC
  • Auto or manual video tagging system for easy video retrieval, event bookmarking
  • EMAP Function simply add cameras + alarm event buttons for live event action
  • Spot monitor + 3 x Spot monitor for emap, alarm events
  • Video pop-up on alarm with custom sound & colour presentation
  • Pelco D- P PTZ control protocol support with onscreen joystick display
  • PTZ presets, tour support for multiple cameras / manufacturers
  • Motion Detection as standard with video analytics on advanced versions
  • Embed / Broadcast video from cameras to webpages
  • System Log, E-Map, Spot Screen, Digital Zoom,
  • Recording, Playback & Backup
  • Continuous, Motion detection or scheduled recording
  • Record from local & remote cameras and NVR's
  • Database recording file system for near instant video playback
  • Video saved as ASF file for easy playback with standard media player
  • Customise video & audio recording compression & bandwidth settings
  • Dual playback screen inc play, pause, step frame, add bookmark tag on screen1
  • Multiscreen view with scrollable timeline & calendar search on screen 2
  • Easy image snapshot + video export to local or removable device in native format
  • Backup single or multiple video channels by date & time to HD/CD/DVD
  • Remote Access
  • Remote Access via software or IE web browser for unlimited users
  • Real time video stream to Windows Media Player, broadcastable to 1000's of viewers
  • Remote access to video via another PC with EyeSoft over Internet
  • Client license for remote viewing only, available in 10 pack
  • Remote access to alarm events, video analytics data, POS transactions
  • E-Mail alarm notification with picture attachment
  • Customise video broadcast settings for each camera for remote access
  • Custom Video Settings
  • Video filters for deinterlace, region masking
  • Add OSD time, date & camera name stamp
  • Custom text overlay tag filter via SDK
  • Customise video or audio recording bandwidth, compression complexity, smoothness
  • Video Management
  • Manage multiple sites, cameras, alarms from globally distributed systems
  • Build control room and multi monitor surveillance solutions
  • Remote NetConnect service for remote alarm & event management
  • Stack multiple servers to build large scale systems with multiple operators
  • Video Analytics
  • Local & remote alarm / event alerts
  • Local & remote POS & data injection overlay
  • Smoke & Fire Detection
  • Analytics Offload Engine, offload processing from CPU to Nvidia Cuda GPU
  • Object counting statistics graph with 4 counter comparison, historical data
  • motion detection | object detection | missing object | object counting | direction of travel | illegal parking | virtual fence | illegally stopped | congregating crowds | POS till transaction recording.

Software Models

bullet ES4 (P) - 4ch software license

bullet ES8 (P) - 8ch software license

bullet ES16 (P) - 16ch software license

bullet ES32 (P) - 32ch software license

bullet ES64 (P) - 64ch software license

bullet ESCL16 (A)- 10 Pack 16ch Client License (A = add analytics presentation / alarm)

bullet ESCL64 - 10 Pack 64ch Client License

bullet ESVA - Video Analytics Module

bullet ESSM – Smoke & Fire Module

bullet ESVP – EyeSoft Video Player (free download)

bullet ESCP – H.264/JPEG Compatibility Pack (free download)

NOTE: (P) Add P to include POS transaction recording. Add (C) for physical product supplied on a Compact Disk. For client license, add, (A) for analytics presenter.

Recommended Hardware (minimum)

4ch / Internet Viewer
Pentium 4, 1.6GHz, 1GB RAM, 64MB Video

8ch / Internet Viewer
Pentium Dual Core, 1.8GHz, 2GB RAM, 128MB Video

16ch / Client machine
Core2 Duo 2.6GHz, 3GB RAM, 256MB Video

32ch / Client Machine
Quad Core or Xeon / Dual Processor, 3.0GHz, 4GB RAM, 512MB Video

64ch+
Quad Xeon / Quad Processor, 2.5GHz, 6GB RAM, 1GB Video, (64bit recommended)

Recommended Software Requirements (minimum)

NVR / Client PC
XP (SP2+) / Vista / 7 / Server 2008
32bit and 64bit compatible
.Net 3.0 higher
DirectX 9.0c

Remote Viewer
XP (SP2+) / Vista / 7 / Server 2000/2003/2008
IE Explorer 6+ / java 5.0+
Windows Media Player 11 (optional)



Sunday, November 8, 2009

Guide for choosing the CCTV system

Closed circuit television(CCTV) simply means that the signal is not being broadcast anywhere, but rather is traveling by wire from the source to the receiver.Usually a closed-circuit television (CCTV) system uses a stand-mounted or hand-held video camera to project a magnified image onto a video monitor or a television (TV) screen.

Uses of CCTV includes-

  1. To provide a deterrent to crime and vandalism.
  2. To enable 24 hour monitoring of all the designated areas.
  3. To enable clear identification of miscreants within the range of the CCTV cameras.
  4. To provide continuous recording of all CCTV cameras in the system.
  5. To enable rapid movement of any CCTv camera to pre-set positions of pan, tilt and zoom.
  6. To provide independent viewing of any CCTV camera at the controlling station.
  7. To enable live, real time recording of selected CCTV cameras.

CCTV system should be used at offices, factories, restaurants, shops, workshops, schools, colleges, hospitals, airports, banks, malls, industrial and comercial spaces.


Which type of CCTV systems ?

CCTV camera, recorders( DVRs), Monitor and peripherals like lens, panning unit, controller etc forms a CCTV system. The CCTV system should be customized according to individuals need. First one should analysis the need for a CCTV system. The target for the intruder, is it material goods or information? Strategical placement of cameras and monitoring unit is equally important.


Feature to look for in CCTV systems.


User friendly operation
High resolution & Good quality images
High compression ratio to save hard drive space and band width
Power efficient to save running cost
Easy recording, search and back up
Pre Sales & After Sales Support
Current Dated Technology
Our product- CCTV System

Feature to look for in CCTV DVRS.


DVR is abbreviation of Digital Video Recorders
Digital image data is compressed and stored in Hard Drive
There are several types of DVR- PC based DVR, Industrial Computer Based DVR, Networked DVR, IP Based Camera and web server.

Saturday, October 31, 2009

Spoofing IP based CCTV systems

Spoofing IP based CCTV systems with VideoJak
each month we are starting to see major problems that exist along side the ip systems. end users (the customers) just finding out they have very expensive yearly licence fees to run there ip systems and another problem that has just been released is the following artical from america.

Spoofing IP based CCTV systems
The case against the security of IP based CCTV systems was recently highlighted with the release of a new web tool shown at the hacker conference in Las Vegas. A security assessment tool, Videojak has the ability to both intercept Internet video feeds and eject false 'looped' images.

Similar in concept to Hollywood's "Mission Impossible" where the attacker can hack, monitor and record a CCTV feed (when nothing is happening), then play this back in a loop to hide the actual live feed (presumably while Tom Cruise is lowered down on a black rope).
This tool also provides the ability to intercept video conferencing.

To be on the safe side, if you are using any kind of conferencing facility you should assume that the information can be intercepted. With the popularity of IP streamed video systems we are not sure if our network is compromised or not use analog in the top security place.

join : http://www.gobeyondsecurity.com/forum/topic/show?id=2335691%3ATopic%3A16591

Tuesday, October 27, 2009

'On campus security' for SMB/SME (small/mid-sized business firm)

Larger businesses have more resources to guard their premises, Making Small businesses more vulnerable to intrusion and robbery. Therefore, Small businesses should plan and execute there security measures properly. The Security concerns for small businesses would depend on kind of business they are engaged in. A software development firm may want to guard their important data even from its employees. A SM Company might want to guard their valuable commodities like jewelery from theft. Some would want to monitor their godowns and storage. Production and manufacturing unit may want to screen Personals for a possible theft of raw materials etc.
The advancement in the technology have evolved over the years by understanding the needs and threats for organizations. A business owner (out of ignorance or cutting expenses) should not compromise on Security of their organizations. In a broader picture, a properly implemented security system will reduce cost of man guarding and prevent losses by raw material theft, robberies, secret leak etc.
These are the prime areas of implementing a security system-
1) Premises- You may need fencing, site surveillance CCTV, patrolling guards, etc.
2) Entrances and exits- You may need to monitoring exits or entrances with CCTV. Install metal detectors or door alarms.
3) Authorized Entry- An access control system for employees according to hierarchy levels. Issuing of access control cards will also help in attendance at main entrances.
4) screening- at production units, where the employees handle raw material.
5) Response method- installing security or fire alarms, emergency security dialer which can automatically call and inform 10 telephones numbers when the alarm is triggered.

Saturday, October 10, 2009

DO EMI & Video Signals Mix? No they do not.

DO EMI & Video Signals Mix? No they do not.

EMI (Electromagnetic Interference) is a disturbance in an electrical circuit.  The source of EMI can be any object that contains rapidly changing electrical currents.  Almost anything that uses electricity to operate is a source of EMI.  The problem with EMI, concerning surveillance, is that it distorts video signal.  When installing a CCTV system, it’s important to run cables away from sources of EMI.  Otherwise, the video feed on the DVR will be extremely fuzzy.  This should definitely be taken into consideration when installing a surveillance system in an industrial environment.  One common source of EMI is fluorescent lighting.  Fluorescent lights are common in industrial areas.   Running cable close to these lights should be avoided at all costs.  If cabling absolutely has to be run close to fluorescent lights, then it should be ran in some type of conduit that is properly insulated and will create a barrier between the video cable and the light.

Saturday, October 3, 2009

Your cell phone to home wi-fi network Connection

Connect your cell phone to home WIFI network ( BSNL Broadband) & Watch your Office

Requirements :
* Wifi enabled Handset
* Active Internet Connection with WIFI router modem

Configure your router modem to use the PPPPoE connection type
Restore your router to factory settings (Preferred & recommended). See your router manual. Type in   192.168.1.1 in your url address bar and hit enter.  You will be prompted for a username and password which generally is admin and admin respectively unless you have not configured it manually. Also, the default username password could be different if you have a different model. Refer your router manual.
192.168.1.1 is an IP address in the private IP address range 192.168.0.0 – 192.168.255.255. Many network devices, such as LinkSys routers, use 192.168.1.1 as their default IP address.


Now follow these steps :





Configure your Wireless Security :


TCP/IP Settings:



Now, Configure your phone:  ( I  AM USING NOKIA 5800 XM )









Here we are !  Now Browse wireless @ great speed without 3G hassle ( at least when you are in WIFI hotspots ! )

Monday, September 28, 2009

A Brief Introduction of NVR

A Brief Introduction of NVR | IPC Systems
Network Video Recorder namely NVR, is an internet protocol based device that sits on your network and is a centralized, networked recorder solution that connects multiple IP cameras simultaneously. It can record video in a digital format to a disk drive, SD memory card or other storage devices. Because they are IP based, network DVR can be managed remotely via your LAN or over the Internet giving you greater flexibility.

Best Wireless Outdoor Security Camera System for Home & Business Surveillance
Are you tired of the long cables? How can you get rid of it? With the arrival of the high definition monitoring age, NVR system becomes the main stream of security industry for monitoring. Because of its characteristics, it becomes popular among users.

Main Features of a NVR Security Camera System

1. Wireless solution -- No cables are needed for wireless outdoor security camera system, free yourself from long video audio wires and enjoy the convenience of wireless.

2. Safety Transmission & Monitoring -- Under a private network transfer protocol, this network video recorder ensures security during video transmission and network remote monitoring of your cameras.

3. Plug-n-play, Hassle-free Setup -- There is no need to incur the cost of hiring and installation technician, as NVR is easy to setup n a matter of minutes. Just connect power to the NVR, join your network, and you’re done.

4. NVR Auto Add IP Camera -- Once the system has started, intelligent IP search software will automatically begin searching for IP cameras in the same local network. Up to four cameras will be added to the NVR automatically.

5. Instant Email Alerts if Alarm is triggered -- This system is designed to send an email alert, complete with photo of the activity, if alarm is triggered, or if it experiences exception such as hard disk error or no space.

6. Super Convenient Control via IE Browser -- Via IE browser, nearly all of the NVR actions can be implemented including: real-time preview, download and playback of video footage, configuration of NVR parameters, and upgrade of devices.


In all,now New NVR features a compact and elegant appearance, optimal metal housing of the four IP cameras enables them to work in various weather conditions wirelessly. It is a perfect choice for someone who does not want to drill holes on the wall, which save trouble on cables and wires. With the digital wireless condition, NVR security systems enable you to monitor your home or business anywhere anytime which ensure your home safety and give you peace of mind around the clock.

Thursday, September 17, 2009

The trouble with wireless system

Marketing literature regarding wireless systems (of all types) generally paint a picture of effortless installation with uncompromised operation. Unbelievably these wireless products don’t always live up to the promises made in the bumf. I will never forget when a colleague of mine installed a satellite navigation system with a Bluetooth wireless connection between their PDA and the GPS device. Both the PDA and GPS devices had batteries that lasted about an hour, so for most journeys they both needed to be plugged into the car's cigarette lighter socket. As there was only one socket my colleague required another device to allow the connection of multiple plugs. The Bluetooth connection between the devices would work fine, until you got to a tricky roundabout in Paris and then it would stop working inexplicably. This meant another cable was required to connect the PDA to the GPS. In addition, to fix the PDA in position a large piece of plastic with a sucker on one end was required. With wires dangling everywhere the whole thing felt like Darth Vader’s bathtub. Definitely not as advertised.

Sometimes wireless systems just don’t work properly. Any of you with experience of the cheap and cheerful intruder alarm systems that have been available from DIY stores for years will know what I mean. It may or may not be the case now but these systems have a well earnt reputation for being unreliable. The problem seems to be not only the wireless technology used but also the way it has been incorporated and used in the system design. Whatever the reason it’s no good.

Whichever way you look at it a wireless connection is not as reliable as a wired connection. Wireless links are affected by their environment and this can change in ways that can be anticipated and ways that can’t. Large metal things like cars being parked in the wrong places can cause problems for example. In addition, every building has a unique environment and this makes specifying what equipment to put where very difficult. 

Having spent the last few paragraphs chiding wireless systems I would like to announce that Paxton Access are soon to release a wireless Net2 control unit. 

It’s called the Net2 nano control unit and it has been designed with all of the above problems in mind. The 'wireless bit' is the data connection from the PC to the control unit. Here are my answers to some of the issues raised in the earlier paragraphs:

If I still have to wire in the power supply, reader and exit button then what’s the point?
Wiring a dedicated RS485 network is often the most time consuming and problematic part of a Net2 installation. Not having to cable round the building is a big plus for a lot of projects. We sell a lot of Switch2 stand alone systems precisely because you don’t have to wire all the control units together. We can now offer PC based features with the ease of installation that comes with stand alone systems (does that sound too much like the marketing material I was berating in the first paragraph?)

How can I specify what equipment to use if every building has a unique environment?
We have an installer tool called a Net2Air site surveyor. This consists of two parts, a USB plug-in transmitter, and a battery powered keycard with signal strength LED’s. When doing a site survey, plug the transmitter in where the Net2 server PC would be located. Walk around to each door checking the signal strength on the keycard. If you get green LED’s lighting up then that’s fine. If you can only see red LED’s then the signal strength is not good enough.

What happens if somebody parks a bus in front of the control unit and breaks the wireless connection?
It doesn’t matter. The wireless connection is only used for transferring data such as access events and new access privileges. All decisions regarding access are made locally at the control unit. This distributed intelligence means that if the wireless connection is broken the system continues to allow access to authorised users in the usual way. When the connection is restored the events are uploaded to the PC.

What if I install the system and it just doesn’t work?
If you install a control unit and it is out of range we have a TCP/IP wireless repeater. This device plugs into the computer network at any point and will extend the wireless network in all directions around that point. This device has the option of using Power Over Ethernet for convenience.

Will the wireless signal damage my children and make them go orange?
No. The type of wireless communication used by Paxton Access is a low power technology designed to work using batteries. The specifications have been determined by the IEEE commission (the people responsible for WiFi) and its signal strength is approximately 5 times weaker than that of the wireless PC networks that most people currently have at work and in their homes. Signal strength should not be confused with the range as in many cases the range of our low power technology is equal to that of WiFi.

What if the Net2 nano wireless control unit just isn’t suitable for use on a particular door?
No problem, use one of the other Net2 control units (Net2 classic, RS485 or Net2 plus, TCP/IP). All Net2 control units are designed to be mixed and matched as required.

Monday, September 7, 2009

Section 43 Of The Information Technology Act, 2000(amended in 2008) in INDIA

Section 43 Of The Information Technology Act, 2000(amended in 2008) in INDIA

Internet is a window to me. Well, it is a window to millions of users like me. This window brings in good inflow of knowledge, some sweet breeze of friendships, economic inflow for some, and also dusty wind which carries viruses.  Even those, who do not access internet from their own computers, may bring to their own “safe computers” or to other’s computers all these unwanted pollutions by secondary methods like CDs, Pen drives, Floppies etc. I bet that every common man, woman or a school going child who uses computer, is afraid of pollution of computer.  There are hundreds of modes to pollute a computer ……nonetheless, hundreds of reasons too for doing this mischievous act. The Indian Information Technology Act recognizes two  most prominent modes of polluting the computer under section 43© , i.e introducing or causing to introduce computer contaminant and computer virus. Note that the mode is a two folded mode, i.e either directly introducing or causing to introduce.  This direct or indirect operation includes introduction of any computer contaminant and/or computer virus to the computer as a machine, computer system and the computer network as a whole.
Look at the draftsmen’s  particular observance on the distinguishing feature of ‘computer contaminant’ and ‘computer virus’….explanation to section 43 says under clause (i) that “computer contaminant” is a term which has been used to indicate “any set of instruction” which is designed to
(a) modify,
(b) destroy,
(c) record,
(d) transmit  any data or programme residing within a computer . The term also includes any set of instructions which is designed by any means, to  usurp the normal computer operations. This means that this provision penalizes any or the whole activity done in this course.

             Now, coming to the term “computer virus”, the first thing which came in my mind was the usage of the term “virus” in the very thought provoking movie “3 idiots”. The protagonist and others in the movie named the strict disciplinarian head of the institution “Virus”. It was a short form of his name “Veeru Shasrabudhhi”. But I felt that probably the movie wanted to establish the fact that “Virus” was polluting the minds of young aspirant researchers……………..exactly the way computer viruses pollute the data within the computers which may have been produced after real hard work. The legislation aforementioned in its explanation under clause (iii) clarifies what is meant by the term “computer virus”. It is explained as computer instruction, data or information or programmes that can either destroy, damage, degrade, adversely affect the computer functioning; or can attach itself to another computer resource and operate simultaneously when any data , instruction or programme is executed in that computer resource. The language of the legislation therefore indicates that ‘computer virus’ can include ‘computer contaminant’ too. Nonetheless, computer virus and computer contaminant could be the two prominent modes for hacking, besides monitoring and modifying the contents. Section 43 regulates such pollution of the computer (inclusive of computer contamination and polluting the computer through virus attack) by awarding pecuniary sanction of Rupees 1 Crore which the guilty person has to pay as compensation to the person affected as such.

Taking this provision as the base, hacking and modification of the content by such “pollutions” have also been regulated by Information Technology Act, 2008 under Section 65 (especially when the offense includes destruction, alteration of the computer source code which is required to be maintained by law for the time being in force) and section 66 (which includes all the offences as has been mentioned under Section 43, including ‘polluting’ the computer). Section 65 awards sentence which could be either imprisonment term up to 3 years or  pecuniary sanction which may extend to two lakh Rupees , or both; whereas section 66 awards sentence which could be imprisonment which may extend to three years , or pecuniary fine of  five lakh Rupees, or  both.


Hence do not take computer contamination or virus attacks lightly. If you are a programmer and you are asked to create any such programme, think again how it may affect you if you were the victim. If you are the victim, do not encourage any “techy” to beat the wrongdoer. The law is there to help…..however, how far it can be used and executed, remains still a matter of debates.