Showing posts with label Analog CCTV. Show all posts
Showing posts with label Analog CCTV. Show all posts

Friday, December 19, 2014

Value of Video Verification

The Value of Video Verification

A CCTV system tracks the inside and outside of a building and sends the indications to a screen. If you’re worried about the safety of your workspace, CCTV installations in India will assist you in protecting your property from anywhere at any time. CCTV services are also being used as an extra weapon in the war against crime in several countries around the world. This blog post will show you how CCTV video is crucial in criminal investigations. 

We will attempt to explain the significance of identifying the charged individual in light of Section 9 of the Indian Evidence Act, 1872 (subsequently referred to as “IEA”). In situations where there is no one to determine the identification of the convicted person, the performance of the offence may be proven by circumstantial evidence. CCTV footage is one example of such evidence. Secondly, this article examines the nature of CCTV footage using different case laws and asks if a lawsuit can be formed strictly on the grounds of a single element of CCTV footage. Finally, to prevent misunderstandings, here we will examine the procedure of electronic evidence admissibility in court in light of Section 65(b) of the IEA.

Video verification adds significant value to security and operations by transforming raw CCTV footage into actionable, reliable intelligence. Its core benefits lie in improving response accuracy, providing strong legal evidence, and delivering broader operational insights.

Key Benefits of CCTV Video Verification

Enhanced Security and Emergency Response 

·        False Alarm Reduction: Video verification allows trained operators or AI systems to visually confirm the cause of an alarm (e.g., distinguishing a pet from an intruder) before dispatching emergency services. This significantly reduces false alarms, which drain resources and can lead to fines.

·        Prioritized Emergency Response: Alarms that have been visually verified as genuine emergencies often receive a higher priority and faster response from police and other emergency services.

·        Proactive Intervention: With live monitoring and verification, operators can issue real-time audio warnings to deter intruders, often preventing an incident from escalating further.

·        Accurate Threat Assessment: Visual confirmation provides detailed information about the nature and severity of an incident, allowing for a more appropriate and measured response from security personnel and first responders. 

Investigative and Legal Value

·        Strong Evidence: Verified CCTV footage provides objective visual documentation that carries significant weight in legal proceedings and insurance claims. It can support or disprove witness testimonies and other evidence.

·        Suspect Identification and Elimination: The footage aids investigators in identifying suspects, tracking their movements (entry/exit routes, timelines), and can also help eliminate innocent individuals from inquiries.

·        Admissibility in Court: When handled correctly (maintaining a clear "chain of custody," proper storage, and technical authentication via a certificate of integrity), footage is highly admissible as evidence in court, which can lead to early guilty pleas and save trial costs.

·        Dispute Resolution: Objective visual records can quickly resolve disputes between customers, employees, or other parties, potentially saving businesses substantial litigation costs. 

Operational and Business Intelligence

Beyond security, video verification offers valuable operational insights: 

·        Remote Monitoring and Management: Business owners and managers can remotely access live or recorded footage from anywhere, enabling effective oversight across multiple locations and reducing the need for physical inspections.

·        Efficiency Improvements: Footage can be analyzed to identify operational inefficiencies, improve staffing levels during peak times, monitor equipment condition for maintenance, and verify cleaning or contractor work quality.

·        Employee Safety and Productivity: Monitoring work areas ensures compliance with safety regulations and encourages adherence to best practices, helping to protect employees and boost productivity. 

In essence, the value of CCTV video verification lies in its ability to transform passive surveillance into an active, intelligent, and multi-purpose tool that enhances safety, streamlines operations, and provides legally sound documentation.

Admissibility of E-evidence in criminal proceedings

Where every electronic evidence is being used as proof, Section 65(b) of the IEA requires that the substance of the electronic record be proven. The main objective of Section 65(b) is to protect supplementary evidence. In the case of Arjun Panditrao Khotkar vs Kailash Kushanrao Gorantyal, the Supreme Court reconsidered Section 65(b) of the IEA, resolving the conflicted status of Section 65(b) in The Indian Evidence Act, 1872.

The Court reversed the decision in the case of Shafhi Mohammad vs State of Himachal Pradesh, holding that the certification needed under Section 65b (4) is a prerequisite to the permissibility of proof using testimony. According to a three-judge panel in the case of Anvar P.V. vs P.K. Basheer, an electronic document exists. The Lord’s Bench Arjun Panditrao’s recent judgment explained about the certificate under the Section. By stating, “If the final text is submitted even before Court for review, Section 64b (4) is not required for Examination, then the situation in terms of the certificate requirement has become transparent”.

In the case of CCTV, the image is captured by the sensors and transformed to digital by the DVR ( Digital Video Recorder). Since it stores data in electronic form, the DVR is an electronic record. If the DVR is presented to the Court, it will be considered the main evidence by Section 62 of the IEA unless the original document is presented to the Court for review, and the provisions of Section 65b (4) of the IEA will not apply. Nevertheless, if a huge proportion of devices are mounted and the data is collected, It is not necessary to put the whole set up just before Court because it is technically held on massive servers. The only other choice in this situation is to transfer the files from the massive server to a CD or USB and then present it to the Court. Since the USB and CD are not primary evidence, complying with Section 65b(4) is required.

The person in charge of the server must provide you with a certificate. The primary objective of the certificate is to ensure the proper workplace environment of the device from which the electronic record is generated well before the Court for review, such that it can be known that the material has not been interfered with by others or ill-treated as a result of a computer malfunction. The certificate has not been made a requirement to confirm the accuracy of the content of the computer-generated records.

Mandatory requirement

If the requirements in Section 65b(2) are met, any information found in an electronic record, which is printed on paper, stored, registered, or copied in optical or magnetic media created by a machine, is considered to have been a piece of information (under the Evidence Act) despite anything in the Evidence Act. If the requirements in Section 65b(2) are met, the material over which the information contained inside an electronic record is published, or the optical or magnetic media-generated either by software where such data is stored, recorded, or replicated, shall be admissible in any proceeding as proof of any nature of the initial or of any truth specified, despite evidence or production of the original.

When a claim in the proof is obtained under Section 65b, Section 65b(4) enables the creation of a certificate that, among other things, identifies the electronic copy containing the statement, explains how it was generated, and specifies the system used to make the electronic record to demonstrate that it was generated by a compliant system.

Important case laws 

K. Ramajayam Vs Inspector of Police

In the case of K. Ramajayam Vs Inspector of Police; Dhanaram and Gunaram were brothers who owned and operated “Balaji Pawn Brokers,” a pawnbroking and jewelry shop. Around 8:00 a.m., the deceased Gunaram opened the store. Dhanaram arrived around 9:00 a.m. and stayed for a while before leaving for another job. He was surprised to see his brother lying in a pool of blood when he returned to the shop around midnight. He sounded the alarm, and nearby shop owners arrived. Aside from the homicide, 935 grams of gold were stolen. The plaintiffs’ counsel relied heavily on the Supreme Court ruling in PV Anvar Vs PV Basheer, which defined Sections 65A and 65(b) of the Indian Evidence Act, 1872. The Supreme Court decided that encrypted data on a CD which lacks a Section 65(b) certificate is invalid proof.

According to the prosecutor’s office, the Supreme Court claimed in the same situation as the applicant that when an electronic record is provided as direct information under Section 62, it is permissible in complying with the terms outlined in Section 65(b). In the current situation, vast institutions are involved.

The tribunal held that while Section 2(t) of the IT Act, 2000 does not explicitly define electronic evidence, the complete databases could be taken into courtrooms under such circumstances. Since the defendant was explicitly captured on camera when committing his crime in this case, the CCTV footage should be considered electronic proof.

The appellant/conviction suspect’s under Section 404 of the Indian Penal Code, 1860, as well as the penalty levied on him was overturned. The convictions of suspects were upheld under Sections 449, 392, and 302. The punishments levied for the offences under Sections 449 and 392 of the Indian Penal Code are also enforced. The death penalty levied for the violation of Section 302 is overturned. Instead, the accused/appellant is sentenced to life in jail. The convicted will be sentenced to a minimum of 25 years in prison, during which time he will not be eligible for any constitutional relief or plea agreement.

Anvar P.V. Vs. P.K. Basheer & Ors.

In this case, the Judicial Branch has resolved the problems surrounding the admissibility of electronic evidence that arose from numerous contradictory decisions and also the procedures adopted by various High Courts and Trial Courts. The Court has interpreted Sections 22A, 45A, 59, 65A, 65(b), and 65(c) of the Evidence Act, holding that secondary information on CDs, DVDs, and Pen Drives is not permissible without even a certificate under Section 65b (4) of the Evidence Act. It’s been established that electronic evidence obtained without even a certificate under Section 65(b) of the Evidence Act cannot be proven by oral evidence, and also that the expert advice obtained under Section 45A of the Evidence Act cannot be used to make this electronic evidence permissible.

The decision will have far-reaching consequences throughout all contexts where even the prosecutor depends on electronic evidence, especially in anti-corruption trials where audio-video recordings are transmitted to the court on CD/DVD. In all such places, where the CD/DVD is transmitted without the need for certification under Section 65(b) of the Evidence Act, the CD/DVD is inadmissible, and the Court cannot look into more expert opinion as to their authenticity, as the Supreme Court Judgment shows.

It was also noted that all of these precautions are taken to protect the origin and reliability, which are the dual key components of reliable source electronic documents that were hoped to be used as evidence. “Since electronic records are more vulnerable to modification, deletion, transposition, excision, and other forms of fraud, a trial based solely on electronic records may result in a miscarriage of justice”.

Conclusion

In today’s world, CCTV cameras are almost everywhere to keep crime at bay. CCTV video has been used by law enforcement authorities to solve crimes and arrest criminals on several occasions. The CCTV captures a truthful image of the events, and the Courts make a significant impact on its integrity as a result of its accuracy. After the IEA introduced Section 65(b), the Supreme Court has issued several judgments emphasizing the value of electronic evidence admissibility.

It can be used as sufficient proof if the surveillance video is reliable, the source of the recording is known, and it meets the requirements of Section 65(b) of the IEA. Based on certain characteristics of CCTV, a substantiated claim can be formed. Since eye witnesses’ statements could vary from one another and they have the propensity and potential to amend their statements, CCTV proof cannot be said to be equal to witness testimony. Nevertheless, sufficient quality CCTV footage reveals the real event of the incident, and certain documentation can be used to conclude the homicide and identify the suspect.

 

Wednesday, September 17, 2014

Security Cameras in Our Growing Technological Society

Security Cameras in Our Growing Technological Society

Within our rapidly-growing technological society, CCTV Cameras are gradually becoming a larger part of our lives. As security concerns grow in a post-9/11 world, and as affordable security cameras become more prevalent, we are beginning to see the implementation of security cameras not just in homes and businesses, but also out on public streets.


As the prevalence of security cameras becomes greater, privacy concerns also grow: Is it worth sacrificing our personal privacy for the sake of ultimate security? In many areas, you can’t walk a couple blocks without being recorded by a camera. With the increase in public security, many questions have arisen. Although public footage is kept only in the case of an emergency, many people still fear the “big brother” concept detailed in 1984, George Orwell’s famous novel about a paranoid society controlled and monitored by an oppressive government.


But when looking at vast amount of cases where killers, rapists, burglars, etc. have been discovered and apprehended thanks to CCTV camera footage, it’s hard to dismiss public surveillance cameras as invasive. Innocent footage is most likely never seen, and even if someone were to watch you whistling while walking down the street, would it really matter? As long as footage is never abused in any way, security cameras should remain an integral part of our landscape.

Sunday, May 19, 2013

45% of End User Security Budgets Increasing



With much talk of budget cuts, many US-based organizations are still willing to pour dollars into their physical security initiatives, at least according to a recent study from by IMS Research. In fact, 45 percent of end users say that their security budget increased in 2012, the study found.

"It's clear that end users are still feeling the risk to their facilities -- and that means there's plenty of opportunity for manufacturers of physical security equipment," said Niall Jenkins, manager for video surveillance and security services research at IMS, in a press statement. "Just having a budget available was actually one of the top two reasons for end users paying to replace or upgrade their systems as well."

The survey, which polled 200 end users of physical security equipment across North America, found that the majority of these organizations are dedicating large amounts of resources to physical security. In fact, 44 percent reported that their organization's annual budget exceeded Rs. 5000K.

"Budgets either stayed the same or increased last year for those that spent approximately Rs. 1Cr and also for 85 percent of the overall market," Jenkins noted. "I wouldn't say that the security boom is over just yet."

Even with bigger budgets, users report concerns. Despite investing in new equipment, buyers say that their biggest worry is that vendors will suspend support for newly-acquired security products while they are still being productively used within the organization, the survey found.

Especially as the market in the US transitions from analog to network-based video surveillance, vendors are shifting their product mixes and ending support for products, said Jenkins in an interview with IFSEC Global. "There's also a transition to the use of video analytics, PSIM, and wireless infrastructure," he added. "In the fire market, you don't see that pace of development, while intruder alarm and access control are probably somewhere in the middle."
In addition, some vertical markets feel better served by security vendors. "The majority of end user markets, when asked about whether security meet their needs, were positive, but the transportation industry overall jumped out as one vertical that said the security industry wasn't meet their needs," Jenkins told us.

So, let us know. Is your budget on the rise? Where do you plan to invest?

Indian Company also increase there Security Budgets in 2013.

We hope that you have found this resource page to be helpful.  
 
If you have any questions about this page or anything related to CCTV or surveillance systems, please contact us at bhadra_1980@yahoo.com

Sunday, September 23, 2012

FCC Part 15

The Federal Code Of Regulation (CFR) FCC Part 15 is a common testing standard for most electronic equipment. FCC Part 15 covers the regulations under which an intentional, unintentional, or incidental radiator that can be operated without an individual license. FCC Part 15 covers as well the technical specifications, administrative requirements and other conditions relating to the marketing of FCC Part 15 devices. Depending on the type of the equipment, verification, declaration of conformity, or certification is the process for FCC Part 15 compliance.
Verification is a procedure where the manufacturer makes measurements or takes the necessary steps to insure that the equipment complies with the appropriate technical standards. Submittal of a sample unit or representative data to the Commission demonstrating compliance is not required unless specifically requested the Commission. Verification attached to the equipment a label showing that compliance is met.
Declaration of Conformity is a procedure where the responsible party makes measurements or takes other necessary steps to ensure that the equipment complies with the appropriate technical standards. Submittal of a sample unit or representative data to the Commissions demonstrating compliance is not required unless specifically requested. The Declaration of Conformity attaches to the equipment a label showing that the sample has been tested and found acceptable by the responsible party.
Certification is an equipment authorization issued by the Commission, based on representations and test data submitted by eh applicant. Certification attaches to the units subsequently marketed by the grantee which are identical to the sample tested an FCC ID number to show compliance.
FCC Part 15 Subpart A contains specific information regarding testing and certification. Information like, scope of the rules and legal implications, definitions, prohibition against eavesdropping, labeling, and other sections.
Some more interesting descriptions used in the FCC Part 15 as listed in Subpart A.
Digital Device. “An unintentional radiator (device or system) that generates and uses timing signals or pulses at a rate in excess of 9,000 pulses (cycles) per second and uses digital techniques; inclusive of telephone equipment that uses digital techniques or any device or system that generates and uses radio frequency energy for the purpose of performing data processing functions such as electronics computations, operations, transformations, recording, filing, sorting, storage, retrieval, or transfer. A radio frequency device that is specifically subject to an emanation requirement in any other FCC Rule part or an intentional radiator subject to Subpart C of this part that contains a digital device is not subject to the standards for digital devices, provided the digital device is used only the enable operation of the radio frequency device and the digital device does not control additional functions or capabilities.”
Intentional radiator. “A device that intentionally generates and emits radio frequency energy by radiation or induction.”
Class A Digital Device. “A digital device that is marketed for use in a commercial, industrial or business environment, exclusive of a device which is marketed for use by the general public or is intended to be used in the home.”
Class B Digital Device. “A digital device that is marketed for use in a residential environment notwithstanding use in commercial, business and industrial environments. Examples of such devices included, but are not limited to, personal computers, calculators, and similar electronics devices that are marketed for use by the general public.
FCC Part 15 Subpart B is for unintentional radiators. The category of unintentional radiators includes a wide variety of devices that contain clocks or oscillators and logic circuitry but that do not deliberately generate radio frequencies emissions. Among the common unintentional radiators are personal computers, peripherals, receivers, radios, TV sets, and cable TV home terminals. FCC Part 15 Section 15.101 has a very informative table for unintentional radiators. Two levels of radiation and conducted emissions limits for unintentional radiators are specified in FCC Part 15 Subpart B. The two levels are Class A digital devices, the higher less strict limits, and Class B digital devices, the lower more strict limits. Manufacturers are encouraged to meet the Class B digital device limits.
FCC Part 15 Subpart C is for intentional radiators. The carious types of intentional radiators covered by Subpart C include cable-locating equipment, cordless telephones, remote control and alarm transmitters, field-disturbance sensors for opening doors, and spread-spectrum systems for wideband data transmission. Intentional radiators governed by FCC Part 15 Subpart C must either have a permanently attached antenna or provide a unique coupler to prevent the use of unauthorized antennas. The FCC Part 15 Subpart C rules for operation of radio transmitters for the most part are very detailed regarding fundamental field strength, power and/or power density, frequency accuracy, and permitted harmonic and spurious emissions.
FCC Part 15 Subpart D outlines the regulations for unlicensed personal communication service (UPCS) devices operating in the 1910 – 1930 MHz frequencies bands.
FCC Part 15 Subpart E sets out the regulations for unlicensed National Information Infrastructure (U-NII) devices operating in the 5.15 – 5.35 GHz, 5.47 – 5.725 GHz, and 5.725 – 5.825 GHz bands.
FCC Part 15 Subpart G sets out the regulations for Access Broadband over Power Line (Access BPL) devices operating in the 1.705-80 MHz band over medium or low voltage lines. This section outlines the geographical area within which Access BPS operations are not permitted in certain frequencies bands.

Friday, June 1, 2012

What the Difference between IP Cameras and CCTV Cameras ?


Many have speculated that the area of CCTV (closed-circuit television) cameras is coming to an end. These multi-purpose video cassette recorders and all their T-160 tapes are quickly being replaced by capture cards, embedded processors, codec, and more advanced devices. IP cameras have played a major role in phasing out CCTV cameras, as they offer many of the same benefits, yet provide much more. What’s the difference? Plenty! Let’s delve into some of the details and find out how IP cameras tower over their analog CCTV counterparts.

Remote Viewing

The major benefit of IP cameras is the luxury to view live video via the internet from any location in the world. While CCTV cameras can enable viewing over the internet, they require additional software and hardware components to function properly. An IP camera is integrated with all the necessary tools and doesn’t require any additional installations. Some of the newer models are even able to view live video on a cell phone or other mobile device over a 3G network.

Remote Recording

The primary function of a surveillance camera is to monitor a certain area when security and staff are unable to do so. While it serves its purpose for the most part, CCTV cameras are susceptible to security breaches, and the tapes they contain can be stolen. IP cameras enable recording to remote locations, which virtually eliminates such a scenario. Even if security is breached, the intruder will not be able to steal the tape or recording device because it is physically stationed at a remote location.

Wireless Capability

Because IP cameras leverage standard IP (Internet Protocol) networks, many of them are available in wireless variations to provide the ultimate in portability. All the device requires is a single cable for a power supply, which results in less work when installing the camera in the recording location.

Video Analytic

More IP cameras are being implemented with video analytics to provide advanced tracking and motion detection capability. This technology is so sophisticated that it has the ability to distinguish between the movement of a person, a car driving down the road, or a tree merely swaying in the wind.

More Advancements to Come

CCTV cameras aren’t completely obsolete, but are light-years behind in comparison to IP cameras. IP technology allows individuals and businesses to effectively monitor their home or office premises with little to no security risks. Evolving rapidly, it’s almost certain that you will be able to do much more with an IP camera in the very near future.

Monday, May 30, 2011

Three Common Mistakes made with Security Company Websites

Find out the three biggest mistakes you can make with your security company website.

I’ve visited a lot of Security and Investigation websites over the years, more so than most people ever will. I’ve also built 100’s of websites over the last decade, so I have an idea of what works and what doesn’t. Some sites are fantastic promotional tools for the company. Many in the security industry though leave a lot to be desired.

Below I’ll cover some of the biggest mistakes I’ve seen on Security Company Websites and give you an insight into why.

1. We are the leading security company
Really? Are you sure? Did you know that the potential client just visited 10 of your competitors and 8 of them said exactly the same thing. Who are they to believe? In a world where information is fast and quick at hand, where your competitors are only a few clicks away, sprouting to the world that you are the leading company does not inspire confidence. In fact it can have a negative effect when everyone else is saying exactly the same thing.

Find ways of inspiring confidence in your product or services that don’t require you to make claims without validation.

2. We offer Security Services Melbourne, Guards Melbourne, CCTV Melbourne, Alarms Melbourne
We get the point, you offer services in Melbourne. But who exactly do you think will be reading the words on your website? Potential clients? Existing clients? What are they going to think when you repeat words over and over to the point where it becomes painful to read? It’s not like you’d ever use a sentence like that when talking to them face to face, but that’s what your website is doing.

Now some of you reading this may be thing why on earth would anyone do that. Well some web designers, so called search engine optimisation experts and some people that just read the wrong things online think that if you repeat words over and over that you’ll get better search engine rankings. To an extent this is somewhat true. I mean the search engines are just programs and need to figure out what your page is about. So including on-topic keywords “within reason” helps the search engines get a better picture of what your company is all about.

The biggest problem with this though lies in the fact that the page will be read by humans, your potential clients. Even if you get the better rankings, what are those potential clients going to think when they read that? You may also find yourself penalized and lose your rankings in the search engines, but that’s another story. There are a lot of factors that go into search engine rankings, so focus on things that don’t require making a mockery of the English language. So to keep it simple, write for humans first, search engines second.

3. Last updated 2007
Do you still exist? You must since you paid your webhosting and domain name fees all this time, but do potential clients know that? A website built in the style of the last millennium also doesn’t inspire much trust or professionalism.

Now not everyone that set-up their website a long time ago believes the internet holds any value for their business. It probably didn’t work for them then and hence forth it probably won’t work now. The website though is a reflection of your business and speaks volumes about your attitude towards potential clients.

A quick update is in store and you don’t even have to break open the piggy bank to do so. With all the how-to websites around, with kids these days learning to build websites in school, I’m sure most companies could find a way to upload at least a one page site to replace that dinosaur. Keep it simple, present it neatly and include all relevant information. It should be a pretty quick thing.

How much is one new client that finds you on the net worth to your security business over a number of years anyway?

Tuesday, March 1, 2011

Products Designed to Provide Home Security

When it comes to protecting your home and your loved ones, you really can't be too cautious. To help homeowners protect the things they cherish, manufacturers of home security products have made a variety of different systems available for use.

Home Alarm SystemsProbably the most used systems for home security are those which come with alarms. The most basic alarm system is a simple device which attaches to an entrance. This economical alarm is usually placed on the front entrance to the home along with a warning sticker informing any would be intruders of the home's protection. On a larger scale, alarm systems can include multiple alarms wired to several entrances as well as first floor windows.

Home security systems with alarms can also include other devices for monitoring the area. Motion sensor cameras and outdoor security lights can be connected to an alarm systems so when they detect motion in the area, the alarms will sound. Some indoor systems use infrared lights to detect motion in the area, which in turn will sound the interior alarm. Alarms are available with different decibel levels making them audible for different ranges. An inexpensive front door alarm will usually be audible to everyone inside the house and possibly to the next door neighbors.

Fake Security DevicesSome people want the security of having deluxe systems installed, but do not have the funds available to invest in these systems. One way to scare off possible intruders is to purchase fake security equipment. Most of the fake items are designed to look like real security cameras. The outer casing is identical to all of the most common types of security cameras, but the inside is empty. These fake cameras come with mounting hardware so they can be attached to any outside wall.

Homeowners can also purchase signs and stickers indicating there are security devices installed on the premises when in fact, there is not. Many people purchase these signs and stickers and place them in their yards and on their doors and windows to deter any potential intruders.

Home Improvements for SecurityIn addition to the alarm and home automation system homeowners can purchase for security, there are also home improvements which can help make a home harder to break into. Replacing screen or service doors on entrances with wrought iron doors will make it much harder for intruders to enter. These doors are made with wrought iron bars designed in attractive styles so they add appeal to the outside of the home.

Installing windows that have interior latch locks can also make them harder to open from the outside. Front doors and garage door sensor can have electronic keypads installed to replace traditional key locks. Keypads require the person to enter their special code number in order to unlock the door. Installing outdoor lights around entrances and on garages will also add protection to a home when the lights are connected to an automatic timer designed to turn them on in the evenings whether you are home or away.

Saturday, October 3, 2009

Your cell phone to home wi-fi network Connection

Connect your cell phone to home WIFI network ( BSNL Broadband) & Watch your Office

Requirements :
* Wifi enabled Handset
* Active Internet Connection with WIFI router modem

Configure your router modem to use the PPPPoE connection type
Restore your router to factory settings (Preferred & recommended). See your router manual. Type in   192.168.1.1 in your url address bar and hit enter.  You will be prompted for a username and password which generally is admin and admin respectively unless you have not configured it manually. Also, the default username password could be different if you have a different model. Refer your router manual.
192.168.1.1 is an IP address in the private IP address range 192.168.0.0 – 192.168.255.255. Many network devices, such as LinkSys routers, use 192.168.1.1 as their default IP address.


Now follow these steps :





Configure your Wireless Security :


TCP/IP Settings:



Now, Configure your phone:  ( I  AM USING NOKIA 5800 XM )









Here we are !  Now Browse wireless @ great speed without 3G hassle ( at least when you are in WIFI hotspots ! )