Saturday, November 19, 2016

How do I uninstall the HDCVI browser plugin

How do I uninstall the HDCVI browser plugin?
FOR WINDOWS:
Firstly, navigate to the Downloads folder and ensure that webplugins.exe isn’t already in theDownloads folder. If webplugins.exe is already in the Downloads folder, move it to the trash or delete that executable file.

Secondly, navigate to the C:\ Drive and, depending on the computer (whether the operating system is Windows XP, Vista, 7, 8 or 10), you may need to search two locations to verify the old plugins aren’t currently installed:

C:\Program Files (x86)\webrec\WEB30\WebPlugin
or
C:\Program Files\webrec\WEB30\WebPlugin

If you were able to navigate to the webrec folder, navigate further to find uninst or uninstall.exe. Make sure all internet browsers are closed, Internet Explorer, Chrome, FireFox, etc. Open the Task Manager and make sure they’re not running any processes in the background.

Now run the uninstaller and make sure all the files are deleted by navigating back to the links provided above. If the folders aren’t empty, you will need to ensure you've closed out any browser that is still running. From here, you can go ahead and delete the webrec folder.

FOR MAC:
Firstly, navigate to your Downloads folder and clarify that webplugins.pkg isn’t already in theDownloads folder. If webplugins.pkg is already in the Downloads folder, move it to trash or delete that file.

Secondly, navigate to the Mac’s Library and find Installed Plug-ins. Use the file path provided below to navigate to:

Macintosh HD\Library\Internet Plug-Ins

If you were able to navigate to the Internet Plug-Ins folder, navigate further to find the files npmedia.bundleand npTimeGrid.bundle. Make sure all internet browsers are closed (Safari, Chrome, FireFox, etc).

Next, move these two listed files to the trash, npmedia.bundle and npTimeGrid.bundle.

Saturday, November 12, 2016

What happens during a fingerprints scan

What happens during a fingerprints scan?


What is a Fingerprint?
The skin surface of the fingers, palms and soles of the feet is different to the rest of the body surface. If you look at the inner surface of your hands and soles of the feet you will see a series of lines made up of elevations which we call 'ridges' and depressions which we call 'furrows'.
These ridges and furrows can be recorded in many ways. For example, the ridges can be inked and placed on to a piece of paper. This would leave a fingerprint like below. The black lines represent the ridges and the white lines represent the furrows.

Within these patterns the ridges can split or end creating ridge characteristics. There are 6 types of ridge characteristics.
Everyone has a unique and different distribution of these characteristics that develop in the womb and are persistent throughout life.

It is the coincidence sequence of these characteristics that allow me to make identifications. The coincidence sequence is whereby I will find the same characteristics, in the same order with the same relationship to each other in both the crime scene fingerprint and the fingerprint on the form I am using.

Fingerprints unique:
It's pretty obvious why we have fingerprints—the tiny friction ridges on the ends of our fingers and thumbs make it easier to grip things. By making our fingers rougher, these ridges increase the force of friction between our hands and the objects we hold, making it harder to drop things. You have fingerprints even before you're born. In fact, fingerprints are completely formed by the time you're seven months old in the womb. Unless you have accidents with your hands, your fingerprints remain the same throughout your life.

Enrollment and verification
Suppose you're in charge of security for a large bank and you want to put a fingerprint scanning system on the main entry turnstile where your employees come in each morning. How exactly would it work?
There are two separate stages involved in using a system like this. First you have to go through a process called enrollment, where the system learns about all the people it will have to recognize each day. During enrollment, each person's fingerprints are scanned, analyzed, and then stored in a coded form on a secure database. Typically it takes less than a half second to store a person's prints and the system works for over 99% of typical users (the failure rate is higher for manual workers than for office workers).
Once enrollment is complete, the system is ready to use—and this is the second stage, known as verification. Anyone who wants to gain access has to put their finger on a scanner. The scanner takes their fingerprint, checks it against all the prints in the database stored during enrollment, and decides whether the person is entitled to gain access or not. Sophisticated fingerprint systems can verify and match up to 40,000 prints per second!

How fingerprint scanners work
a computer has to scan the surface of your finger very quickly and then turn the scanned representation into a code it can check against its database. How does this happen?
There are two main ways of scanning fingers. An optical scanner works by shining a bright light over your fingerprint and taking what is effectively a digital photograph. If you've ever photocopied your hand, you'll know exactly how this works. Instead of producing a dirty black photocopy, the image feeds into a computer scanner. The scanner uses a light-sensitive microchip (either a CCD, charge-coupled device, or a CMOS image sensor) to produce a digital image. The computer analyzes the image automatically, selecting just the fingerprint, and then uses sophisticated pattern-matching software to turn it into a code.
Another type of scanner, known as a capacitive scanner, measures your finger electrically. When your finger rests on a surface, the ridges in your fingerprints touch the surface while the hollows between the ridges stand slightly clear of it. In other words, there are varying distances between each part of your finger and the surface below. A capacitive scanner builds up a picture of your fingerprint by measuring these distances. Scanners like this are a bit like the touchscreens on things like iPhones and iPads.

Unlike ordinary digital photos, scans have to capture exactly the right amount of detail—brightness and contrast—so that the individual ridges and other details in the fingerprint can be accurately matched to scans taken previously. Remember that fingerprints might be used as evidence in criminal trials, where a conviction could result in a long jail sentence or even the death penalty. That's why "quality control" is such an important part of the fingerprint scanning process.


Here's how the process works with a simple optical scanner:
1.    A row of LEDs scans bright light onto the glass (or plastic) surface on which your finger is pressing (sometimes called the platen).
2.    The quality of the image will vary according to how you're pressing, how clean or greasy your fingers are, how clean the scanning surface is, the light level in the room, and so on.
3.    Reflected light bounces back from your finger, through the glass, onto a CCD or CMOS image sensor.
4.    The longer this image-capture process takes, the brighter the image formed on the image sensor.
5.    If the image is too bright, areas of the fingerprint (including important details) may be washed out completely—like an indoor digital photo where the flash is too close or too bright. If it's too dark, the whole image will look black and details will be invisible for the opposite reason.
6.    An algorithm tests whether the image is too light or too dark; if so, an audible beep or LED indicator alerts the operator and we go back to step 1 to try again.
7.    If the image is roughly acceptable, another algorithm tests the level of detail, typically by counting the number of ridges and making sure there are alternate light and dark areas (as you'd expect to find in a decent fingerprint image). If the image fails this test, we go back to step 1 and try again.
8.    Providing the image passes these two tests, the scanner signals that the image is OK to the operator (again, either by beeping or with a different LED indicator). The image is stored as an acceptable scan in flash memory, ready to be transmitted (by USB cable, wireless, Bluetooth, or some similar method) to a "host" computer where it can be processed further. Typically, images captured this way are 512×512 pixels (the dimensions used by the FBI), and the standard image is 2.5cm (1 inch) square, 500 dots per inch, and 256 shades of gray.
9.    The host computer can either store the image on a database (temporarily or indefinitely) or automatically compare it against one or many other fingerprints to find a match.
The matching algorithm finds out whether there is a match by comparing two templates extracted by the characteristic point extraction algorithm, specifically by comparing the positions of each characteristic point and the structure.

Friday, November 4, 2016

British and European Intruder Alarm Standards

British and European Intruder Alarm Standards

DD243
Code of Practice for installation and configuration of intruder alarm systems designed to generate confirmed alarm conditions.
BS 8473:2006
Code of Practice for Intruder and hold-up alarm systems - Management of false alarms
BS EN 50131 Series
European Standards on Intruder Alarms
(Originally due to commence October 2005)
PD6662:2004
Guideline for the implementation of BS EN 50131-1:2004

Introduction
To help ensure that alarms are designed, installed and maintained reliably, suppliers and installers make reference to a series of British Standards and Codes of Practice. Some of these have been withdrawn and replaced by the ‘European Standards for Intruder and Hold Up Alarm Systems' - usually referred to as the Euro Standards.
The Euro Standards only apply to new systems.  Existing systems remain subject to the British Standards and Codes of Practice applying at the time of their installation; but exceptionally may need to comply with the new Euro Standards if they require such extensive re-design/equipment replacement that they effectively become a ‘new system'.

Means of Introduction
Because some of the Euro Standards relating to components are not yet published, and the Euro Standards do not cover some issues that alarms may be required to meet in the UK to satisfy the police or insurers, an enabling ‘standard' has been prepared.  This outlines retained/additional UK requirements that apply alongside the Euro Standards and was published in August 2004 titled ‘PD6662:2004 - Scheme for the application of European Standards for Intruder and Hold up Alarm Systems'.
Timescale for Introduction of PD6662
A transition period operated until 1st December 2005, during which new alarms could be installed to previous British Standards or the PD6662 scheme.  Now PD6662 must be used.

Overview of EN 50131
The major differences between EN 50131 and the old BS 4737 are:
· Structured standards
· Grading of systems
· Classification of equipment
· Risk based
This provides a structured approach to:
· Assessment of risk
· Technical survey
· System design
· Installation of the system in accordance with agreed specification
· Installation of equipment in accordance with manufacturers' recommendations.
A significant advantage for insurers and surveyors applying European Standards to systems is the specification of grades appropriate to the associated Risk. One of the major differences in the European Standards is the grading of systems, which is not a feature of BS 4737.   

Security Grading
Under BS EN 50131-1:2004, intruder alarm systems will need to be Security Graded according to the kind of intruder considered likely to try to defeat the system.

Insurers are understood to support the Grading approach and it is expected that they will, in due course, recommend particular Grades of system in relation to particular premises risks.  Where this turns out to be the case, installers and customers may take the lead given by insurers, as regards the minimum Grade of system they require, and discuss whether to go for a higher Grade of system.

The grading of a system based on a structured risk analysis will determine the:
· Extent of the system
· Signaling
· Tamper security
Within the new European Standards there are four security grades:
· Grade 1 - low risk
· Grade 2 - low to medium risk
· Grade 3 - medium to high risk
· Grade 4 - high risk
Who Decides the Grade of Alarm? 
Installers
Installers are required to carry out a formal assessment of the theft risk to determine a suitable Grade of alarm.
To do so they will consider the items at risk, existing security arrangements and any previous thefts, etc.  Before they proceed they will seek the customer's formal approval, and may also suggest that any interested insurer be consulted. 

Insurers
Depending on the risk exposure, insurers may require an intruder alarm before providing certain insurance covers, eg theft.  As the Grade of an alarm cannot be readily changed after installation, it makes sense to check a proposed alarm with any interested insurer before proceeding.
Insurers may respond to a request to approve an alarm by visiting the premises, making a decision based on information already held by them, or by agreeing the outcome of the installer's risk assessment.
Insurers will make their own decisions, but as a general guide the following is likely: 
Detection and Control System
Grade 2 - Lower risk premises.
Grade 3 - Normal risk premises, ie all except those suitable for Grade 2 or 4
Grade 4 - Very high risk premises, eg cash handling centres, banks, museums.
A further inclusion in the European Standards is the classification of components that are used for the intruder alarm system installations. These will be classified, which in turn will determine where they are installed.
Detection and Control System - Grading
Apart from increasing control panel event memories and levels of recommended detection; the key difference between Grades 2, 3 and 4 is that movement sensors at Grade 3 must be able to detect ‘masking', ie something has been placed over the sensor lens and at Grade 4 ‘range reduction', ie something has blocked part of the detectors' field of view.

Key Action Steps 
When having a new alarm installed:
·        Use a reputable installer, eg one inspected by the NSI (NACOSS) or SSAIB.
·        Co-operate with the installer's risk assessment procedures.
·        Check any interested insurer agrees with the proposed alarm Grade, Detection, Signaling and Response.
·        Where police response necessitates a ‘Confirmation System' check that the installer designs a system that has:
·        Dual Path Signaling
·        Confirmation from each ‘at risk' area
·        A ‘Means of Unsetting' that does not prevent the police being called should an intruder force open the designated alarm entry/exit door.


 BS 8473:2006 European Standards for Intruder Alarm Systems

Code of Practice for intruder and hold-up alarms – Management of false alarms.

BS 8473 has been drawn up to assist all parties in the management of false alarms, to reduce the disproportionate level of resources being absorbed by the police, the alarm industry, customers and operators as a direct result of false activations.

Preventing false alarms: points to remember;
The intruder alarm system (IAS) is to be operated only by persons who have been correctly trained. If there is uncertainty about the correct operational procedures the alarm company should be contacted.
Before leaving the premises check that all doors and windows are physically secured. A walk around the supervised area is the only effective way of doing this properly.
Ensure that detection devices are not obstructed. In particular be careful that infra red beams and movement detectors are not obstructed by stock or other items.
If movement detectors are used do not introduce sources of heat, movement or sound into the area supervised by these detectors without informing the alarm company.
Always follow the entry/exit procedure agreed with the alarm company. Entry through any door other than the one designated should be physically prevented. Switching off the IAS is always the first task on entry.
Before entry, ensure that the means necessary to enter the premises and unset the IAS are known and available in a secure manner to the operator.
Inform the alarm company of any alterations to the premises which could affect the IAS. Do not permit people other than employees of the alarm company to make changes to the IAS. Place system on test when building immediately.
Treat the IAS with care. Wiring and detection devices can be accidentally damaged or moved. If this occurs inform the alarm company immediately.
After a false alarm, check the system carefully, and if possible, note the cause of activation. Inform the alarm company of the believed cause of the activation immediately.
Make sure regular maintenance checks are carried out by the alarm company and that you have the correct contact details for the alarm company and ARC. Remember that excessive false alarms can result in police response being withdrawn.
Most IAS require a mains electricity supply. If the electricity supply to your system is disconnected for more than 4 h contact the alarm company.
EN 50131 European Standards for Intruder Alarm Systems

EN 50131 was phased in to replace British Standards BS4737, BS7042 and BS 6799 and was adopted in October 2005 utilizing PD 6662:2004, an enabling document which facilitated the introduction of EN 50131 into the UK.

The difference between PD6662 / EN 50131and the old British Standards
PD6662 differs from former British Standards in the following ways:
It determines not only the system but also the component design requirements for Intruder and Hold-up Alarm systems.
A comprehensive Risk Assessment is required to determine the design criteria of the system.
Applicable to both hard-wired and wire-less installations.
Grading of systems is required to reflect "the risk". I.E. Grade 1 - Low Risk, Grade 4 - High Risk.

Does my existing system need to be upgraded to comply with PD6662
If your current system complies with the old British Standards and is working effectively changes are not required.
If any upgrade to your system is undertaken your insurance company will require the system to comply with PD6662.
If  you lose Police Response and the URN is withdrawn it can only be reinstated if the system is upgraded to comply with PD6662.

RISK ASSESSMENT
One of the most significant issues within the new EN standards will be evaluating the risk associated with the premises and determining a grade of system. This is because once the grade of a system is determined it will define the extent of the system, its signalling and tamper security requirements.

SECURITY GRADES
One of the most important aspects of the EN 50131 requirements is the concept of a security grade. For each installation the grade of system has to be chosen according to various factors. In the EN the grade is described in terms of the type of intruder and how much effort they would put into a burglary.
What are the Grades?
Grade 1 is for an installation with a low risk of theft. The property is not likely to attract intruders. It is assumed that a thief is likely to be opportunistic rather than bothering to plan things in advance. In the application guide (DD CLC/TS 50131-7) it assumes that an intruder is simply going to break open a door.
Grade 2 is for a slightly higher risk of theft. The property is likely to have something of interest to an experienced thief. In this case the intruder is expected to have some knowledge of how alarm systems work and possibly carry some tools to allow him to overcome a simple alarm system. The thief is likely to check the building for ease of access through doors, windows and other openings.
Grade 3 is for a reasonably substantial risk property. There is good reason to assume it may be broken into and might well contain objects of high value. An intruder is likely to gain access by penetrating doors, windows or other openings. The thief could be very experienced with intruder alarm systems and possess a number of tools and equipment to overcome the system
Grade 4 is for very high-risk properties. Intruders could be expected to plan a burglary in advance and have the knowledge and equipment to alter parts of the intruder alarm system to prevent detection. It is assumed that the intruder could gain access by penetration of floors, walls and ceilings. The intruder is unlikely to be working alone.

What Grade of System does my installation need?
This is difficult to say at the moment and opinion on this matter varies from country to country. The view in the UK tends to require grades that are higher than other countries (e.g. a shop in Belgium at grade 2 could be grade 3 in the UK). To a large degree the choice of grade would be guided by insurance companies. A typical view though could be:
· Grade 1 would only be of interest in domestic properties (without an insurance requirement for an alarm system).
· Grade 2 would be most domestic properties and low risk commercial (e.g. florists)
· Grade 3 would be for high-risk domestics and most commercial properties (e.g. Newsagent with cigarette sales)
· Grade 4 would be for extremely high-risk domestic and higher risk commercial properties (e.g. bullion stores).

Mixing Components of Different Grade
The EN standard says that it is not necessary to use the same grade of component throughout an intruder system.
If the installation is a grade 2 then there is no problem using, for example, a grade 3 power supply.
If however an installer fits a grade 2 component (such as a detector) in a system then that system is limited to grade 2 at best.
It is possible to have a defined part of a system at a higher grade so long as all associated parts are at the same (or higher) grade. For example a system combining intruder and hold-up (PA) functionality could have a grade 4 hold-up system whilst the intruder parts were limited to grade 3. But this example is only valid if the power supply, alarm transmission system and warning devices used by the hold-up (PA) parts are all grade 4. This would still allow intruder parts such as PIR's to be grade 3. The system as a whole is, of course, only grade 3.