Friday, August 5, 2016

Facility Code or Site Code

What is a Facility Code ?
There are many different proximity card formats, but the proximity cards that we sell are encoded with a "Standard" 26-Bit Wiegand format.  Like other proximity and RFID cards, an HID card is simply an ID card which enables proximity technology in its everyday functions. HID cards, as well as other types of RFID cards and smart cards, are popular for access control, as well as other functions like public transportation and employee ID.This format actually contains two sets of numbers:
  •         A 3-digit "facility code", which can range from 1-255
  •         A 5-digit "card number", which can range from 1-65,535.

Most HID proximity cards and key fobs have the 5-digit card number printed on the card.  The 3-digit facility code, however, is printed only on the box in which your cards are shipped.
Gate Keeper can be configured to interpret the Wigand data as either a 16-bit number or a 24-bit number.  The 16-bit number will contain only the 5-digit card number.  The 24-bit number will contain the facility code and card number for a total of 8 digits.  For example, if the facility code for a card is "123" and the card number is "56789" then the 24-bit (8-digit) number read from the card will be "12356789".
A Facility Code is a number encoded on access cards that is intended to represent a specific protected facility or building. Not all card formats support a Facility Code, but the most common card data format in use today does support it — the industry’s original open (i.e. non-proprietary) 26-bit format. The 26-bit format has two data fields: a Facility Code (8 bits) and a Card Number (16 bits), plus two parity bits; thus, the Facility Code number can be a number be between 0 and 255, and the Card Number can be between 0 and 65,535.
With only 65,535 card numbers available across the cards of all customers using the 26-bit card data format, duplicate card numbers are inevitable; therefore, the first purpose of the Facility Code was to enable customers in close proximity to each other to differentiate their set of cards from another customer’s cards. Ideally, each manufacturer would try to manage the facility numbers it issued to various customers in a specific area to minimize the occurrence of duplicates. A card with a Facility Code not matching those used by that specific customer would be denied access, typically generating “Access Denied – Wrong Facility Code” messages.
The 26 bit Wiegand standard format is the industry standard. Card manufacturers such as HID, Indala and AWID sell cards with this format to any dealer. This 26 bit format is recognized by all access hardware.

Over the years, formats with a higher number of bits (33, 37, 48, 50)  have been added to increase card security.


However, some of the higher bit formats are  "proprietary", and usually carry a higher price tag. One exception is the HID 37 bit proprietary format, priced similarly to a 26 bit card.


As an example, if Company A has cards numbered from 1 to 1000, with facility code 230, they would be programmed as follows:

230 - 00001

230 - 00002
230 - 00003 .......up to 230 - 01000

Company B could have the same serial numbers, but with facility code 180, and their cards would be:
180 - 00001
180 - 00002
180 - 00003........up to 180 - 01000

To grant access, an access control system validates the facility code AND the serial number.  Company A will reject Company B cards, and viceversa, even if they have the same serial number, because the facility code does not match.
The HID 37 bit Wiegand format with Facility Code is H10304.  The format consists of 2 parity bits, 16 bit Facility Code and 19 bit Cardholder ID fields.
PFFFFFFFFFFFFFFFFCCCCCCCCCCCCCCCCCCCP
EXXXXXXXXXXXXXXXXXX..................
..................XXXXXXXXXXXXXXXXXXO
P = Parity
O = Odd Parity
E = Even Parity
X = Parity mask
F = Facility Code, range = 0 to  65,535
C = Cardholder ID, range = 0 to 524,287


HID recently announced that the standard format for their Corporate 1000 proximity cards has changed from a 35 bit card format to a new 48 bit card format.

Originally, all Corporate 1000 format cards offered the 35 bit structure (“Corporate 1000 – 35”). The Program’s success created the need for a new format (“Corporate 1000 – 48”).  The larger 48 bit structure change allows for an increased number of individual cards numbers available, from just over 1,000,000 individual card numbers per format for Corporate 1000 – 35 to over 8,000,000 individual card numbers for the new Corporate 1000 – 48 format.
IMPORTANT NOTE: Prox cards are custom programmed with the facility code and start numbers requested by you. For this reason it is important to have the correct numbers at the time an order is placed.

Sunday, July 24, 2016

Access Levels and Access Areas

What's the difference between Access Levels and Access Areas?

Access Areas are enclosed parts of the site where access is controlled by a Keypad, Card Reader, or Single Door Module. This will include the Default area (commonly called 'On-site'), which is the entire site enclosed by the fence and accessed through a gate or main door. It will also include any building where the door access is controlled by an access device, any floor accessed by an elevator keypad, and any gated or walled area within the property controlled by an access device. Access areas do NOT include individually alarmed units, alarmed office areas, or any other part of the site that does not have individual access-controlled doors or gates to enter.
Access Levels combine Access Areas and Time Schedules to control access for groups of users. This allows a site to easily issue access to a user by assigning them into a specific, pre-defined Access Level, without having to select new access privileges each time a new user is entered.  
After you have set up Access Areas and Time Schedules for a site, you create access levels that combine both. Most sites only have 2 - 3 Access Levels for the site:
·         One Access Level for customers who are limited to business hours and to areas that are considered 'On-site'.
·         One Access Level for customers that have 24-hour access to 'On-site' areas of the site.
·         One Access Level for employees that have 24-hour access to all parts of the facility.
Additional Access Levels may include:
·         Customers who have 'extended hours' (such as 6:00 am - 10:00 pm) and have access to 'On-site' areas of the facility.
·         If the site has individual buildings that are keypad-controlled, a separate access level could be set up for each building with the allowed hours for that building.
·         Employees can have separate access levels by shift and areas that they are allowed into.


Saturday, July 9, 2016

Bandwidth Basics for IP CCTV Design

Bandwidth Basics for IP CCTV Design

When using IP cameras, Megapixel cameras, NVRs or even DVRs, understanding the basics about how much bandwidth is available and how much is needed is critical in planning, designing and deploying IP video surveillance systems. Copper Ethernet wiring (typically Cat-5, Cat-5e, Cat-6 or Cat-7) have a practical length limitation of 100 meters (or about 300 feet) between devices. To accommodate longer-length wired network connections, fiber can be used. 
This article is focused for a non-IT audience such as security managers, electronic technicians, sales and marketing folks.

How Much Bandwidth is Available?
To figure out how much bandwidth is available, you first need to determine what locations you are communicating between. Much like driving, you will have a starting point and destination. For example, from your branch office to your headquarters. However, unlike driving, the amount of bandwidth available can range dramatically depending on where you are going.

The most important factor in determining how much bandwidth is available is whether or not you need connectivity between two different buildings.

For instance:
In the Same Building: 70Mb/s to 700 Mb/s of bandwidth is generally available
In Different Buildings: .5 Mb/s to 5 Mb/s of bandwidth is generally available
The amount of bandwidth available going from your office to a co-worker's office in the same building can be 200 times more than the bandwidth from your office to a branch office down the block.
This is true in 90% or more cases. Note the following exceptions:
If these are different buildings but on the same campus, more bandwidth may be available.
If you are in a central business district of a major city, more bandwidth may be available.
If you are a telecommunications or research company, more bandwidth may be available.


Different Buildings
The key driver in bandwidth availability is the cost increase of deploying networks between buildings. Generally referred to as the Wide Area Network or WAN, this type of bandwidth is usually provided by telecommunications companies. One common example is cable modem or DSL, which can provide anywhere from 0.5 Mb/s to 5 Mb/s at Rs. 3000 to Rs. 5000 per month. Another example is a T1, which provides 1.5Mb/s for about Rs. 8000 to Rs. 16000 per month. Above this level, bandwidth generally becomes very expensive.

Many talk about fiber but fiber to the building is not and will not be widely available for years. Fiber to the home or to the business promises to reduce the cost of bandwidth significantly. It is very expensive to deploy and despite excited discussions for the last decade or more, progress remains slow.


Same Buildings
By contrast, bandwidth inside of buildings (or campuses) is quite high because the costs of deploying it are quite low. Non technical users can easily set up a 1000Mb/s networks inside a building (aka Local Area Networks or LANs) for low installation cost with no monthly costs. The cost of deploying networks in buildings are low because there are minimal to no construction expenses. When you are building a network across a city, you need to get rights of ways, trench, install on telephone poles, etc. These are massive projects that can easily demand millions or billions of dollars in up front expenses. By contrast, inside a building, the cables can often by quickly and simply fished through ceilings (not the professional way to do it but the way many people do it in deployments).


A lot of discussion about wireless (WiMax, WiFi, 3G, 4G etc) exists but wireless will not provide significantly greater bandwidth nor significantly better costs than DSL or cable modem. As such, wireless will not solve the expense and limitations of bandwidth between buildings. That being said, wireless absolutely has benefits for mobility purposes and connecting to remote locations that DSL or cable modem cannot cost effectively serve. The point here is simply that it will not solve the problem of bandwidth between buildings being much more expensive than bandwidth inside of buildings.


How Much Bandwidth Do IP Cameras Consume?
For the bandwidth consumption of an IP camera, use 1 Mb/s as a rough rule of thumb. Now, there are many factors that affect total bandwidth consumption. You can certainly stream an IP camera as low as 0.2 Mb/s (or 200 Kb/s) and others as high as 6 Mb/s. The more resolution and greater frame rate you want, the more bandwidth will be used. The more efficient the CODEC you use, the less bandwidth will be used.
For the bandwidth consumption of a Megapixel camera, use 5 Mb/s to 10 Mb/s as a rough rule of thumb. Again, there are a number of factors that affect total bandwidth consumption. A 1.3MP camera at 1FPS can consume as little as 0.8 Mb/s (or 800 Kb/s) yet a 5 megapixel camera can consume as much as 45 Mb/s.



What Does this Mean for my IP Video System?
Just like dealing with personal finance, we can now figure out what we can 'afford':
Between Buildings: We have 0.5 Mb/s to 5 Mb/s to 'spend'
Inside Buildings: We have 70 Mb/s to 700 Mb/s to 'spend'
IP cameras: Cost us 1 Mb/s each
Megapixel cameras: Cost us 5 Mb/s to 10 Mb/s each



Using these points, we can quickly see what combination of IP and megapixel cameras we can use between buildings or inside of buildings.
Inside of buildings, it is easy to stream numerous IP and megapixel cameras.
Between buildings, it is almost impossible to stream numerous IP and megapixel cameras.
Because of this situation, the standard configuration one sees in IP Video systems is:
A local recorder at each building/remote site. The local recorder receives the streams from the building and stores them.


The local recorder only forwards the streams (live or recorded) off-site when a user specifically wants to view video. Rather than overloading the WAN network with unrealistic bandwidth demands all day long, bandwidth is only consumed when a user wants to watch. Generally, remote viewing is sporadic and IP video coexists nicely with the expensive Wide Area Network.

The local recorder has built-in features to reduce the bandwidth needed to stream video to remote clients. Most systems have the ability to reduce the frame rate of the live video stream or to dynamically reduce the video quality to ensure that the video system does not overload the network and that remote viewers can actually see what is going on the other side. Generally, the live video stream is sufficient to identify the basic threat. In any event, bandwidth is generally so costly, especially the upstream bandwidth needed to send to a remote viewer, that this is the best financial decision.

Friday, July 1, 2016

Ethernet Splitter

Ethernet Splitter

An Ethernet splitter can split a single Internet connection so that two or more computers can connect to the Internet simultaneously. It can also create additional connections for other computers on a network, which can reduce the overall amount of cabling required to setup a network. Unfortunately, Ethernet splitters cannot resolve the network collision issues that may occur if the computers connected to the splitter are using the same network resources simultaneously.
The CAT 5E Ethernet splitter allows two separate devices to share the same Ethernet cable. Ethernet splitters are generally used in pairs, with one CAT 5E splitter at the outlet and another Ethernet splitter at the patch panel. This allows for several wiring configurations to connect more devices to your network. Primus Cable offers both Ethernet splitter adapters and pigtail type Ethernet splitters.

The Ethernet Splitter for 1x VOIP + 1x PC, Pigtail Type, 10/100 BaseT 1P/2J 07 splits the signal from one CAT 5E Ethernet cable among two RJ45 connections. This Ethernet splitter is ideal for both domestic and commercial applications. We have both type 7 and type 8 Ethernet splitter adapters. By utilizing this device, two computers can share one CAT 5E Ethernet port. If the router has only one RJ45 port, then an Ethernet switch will be required to run multiple PCs off one signal at the same time.

Our phone cable is commonly used for 10Base-T and 100Base-T networking, particularly for telephone and low speed data applications. We stock both phone cable for plenum and for riser applications. If your project involves installation in plenums or air spaces, the CAT 3 Bulk Cable, Plenum CMP Solid UTP 25Pair 24AWG, 1000, White is a wise choice.


This phone cable features 25 unshielded solid copper pairs in a 24 AWG diameter cable. This phone cable is ideal for indoor voice communications applications, and is supplied on a wooden spool. This CAT 3 phone cable is also easy to install with its color striped pairs.


Primus Cable provides a wide assortment of networking and telco tools for your installation project. EZ-RJPRO™ HD Ratchet Crimp Tool is the professionals’ choice when working with CAT 5E and CAT 6 RJ45 connectors. It also works well with EZ-RJ12/RJ11 connectors. This crimping tool functions as a wire cutter, stripper, and crimping tool all in one. The ratcheted straight action crimping motion ensures a uniform crimp every cycle. Features precision cast crimping dies for superior accuracy. 



How to Connect an Ethernet Splitter
Step 1 – Insert one end of the Ethernet splitter into the primary Ethernet port of the device that is providing the network connection (such as the cable/DSL modem or Internet router).
Step 2 – Insert the Ethernet cables from the devices to be connected (such as a computer, printer, or scanner) into the Ethernet splitter. Users often connect a printer and computer to the splitter in order to minimize the frequency with which network collisions occur while sharing the connection.
Step 3 – Test the connection of the devices on the splitter to ensure that they can connect to network resources.

How to Make an Ethernet Splitter
Step 1 – Procure the following materials: a short Ethernet cable, 2 x RJ45 keystone jacks, electrical tape, super glue, and crimp tool.
Step 2 – Crimp one end of the Ethernet cable so that the wire’s ends are visible. Leave the other end of the cable in-tact.
Step 3 – Follow the directions that come with the keystone jacks to open them, then place the wires from the Ethernet cable into the jacks to split the connection. Place the white and orange wires into Pin #1, the orange wire into Pin #2, the white and green wires into Pin #3, and the green wire into Pin #6. On the second keystone jack, place the white and blue wires into Pin #1, the blue wire into Pin #2, the white and brown wires into Pin #3, and the brown wire into Pin #6.
Step 4 – Glue the jacks to each other by the sides with super glue, then snap them together.
Step 5 – Wrap electrical tape around any exposed wires and begin using the new Ethernet splitter.

This diagram works in a half duplex mode which provides communication in both directions, but only one direction at a time. Under normal operation, each port is constantly sensing any traffic through its receiving pair of wire. As long as it can sense that data is being processed, it will not start sending data. The significance of this operation is to avoid collision where two ports are sending data at the same time, and due to this phenomenon, data will be discarded. When this issue is resolved by both computers, they will start to transmit at random amount of time. The circuit employs the method known as Carrier Sense Multiple Access / Collision Detecion (CSMA/CD) wherein it allows the devices to take turns using the signal carrier line. In this operation, the hub’s primary task is to allow each port to check the signal level of the line to determine whether someone is already using it. The device waits for a few seconds if it is in use, or it transmits otherwise.

Friday, June 24, 2016

Transforming Governance in India

Why startups hold the key for transforming governance in India
As a country, India is perhaps at the right inflection point. The government of India is aggressively promoting digital India with the ultimate objective of powering India into a digital powerhouse backed by the foundation of technology. At the same time, there is another massive wave that is sweeping India. The startup wave has reached unprecedented heights, and India now is one among the first five largest startup communities in the world with the number of start-ups crossing 4,200 (according to a recent Nasscom-Zinnov report). The Prime Minister too has been pitching actively for startups, and has publicly quoted that startups are key for India’s transformation.
Nine Pillers of Digital India

Given the fact that the Government wants transformation enabled by technology, and wants to quickly move with speed to solve some of India’s biggest problems, startups may hold the key for transforming India, as they can look at traditional problems with new solutions.

Take an area like agriculture, which is now plagued by serious issues of farmer suicides and lower yields? Can startups make a difference? Bangalore-based startup, CropIn Technology, has a mobile and cloud-based solution that aims to empower the Indian farmer by making every crop traceable. By using a mobile app, 600 acres can be covered in one man day vis-à-vis the 90 man day period that is typically required. The result – farm productivity has been raised by a minimum of 10-15 percent.

Another big problem that India faces today is the lack of electricity. India has always been a power deficit country, and has consistently suffered grid failures and power blackouts. While the government is looking at technologies such as smart grids to curb thefts and leakages in transmission and distribution, the answer may lie in a solution by Delhi-based startup Zenatix. The startup uses sensors and smart meters to monitor real-time power consumption and advises firms on how they can cut down their energy consumption with minimum effort. For example, for the Indraprastha Institute of Information Technology (IIIT-Delhi ), the firm has been able to save more than Rs 18 lakh per annum, which is roughly equivalent to one month’s energy consumption. Similarly, Mumbai-based startup 2020 Imaging, is looking at using video analytics to prevent stampedes, detect terrorist attacks and aid traffic management.

Armed with a disruptive and frugal mindset, startups can completely change the way traditional problems can be conquered. Unlike traditional firms, startups are not bothered about legacy technologies – they are only concerned about providing value – as it is the key for their existence and future competitiveness.


As more and more Indian startups enter the fray, they will start challenging the way traditional technologies are deployed and implemented. While not every startup will be a success, their rapid rise will ensure that traditional giants will be forced to think innovatively and push the bar for excellence.
India Independence day will be come

Saturday, June 11, 2016

Common Problems and Solution for IP Cameras

IP camera or network camera is a new product which combined with analog and network video streaming technologies, in addition to its image capturing functions like the conventional analog camera, IP camera has built-in video compression processor with web server function, to compress raw video footage, then broadcast over Internet. The authorized users can access the data from anywhere with internet connection. 
What's the common problem of IP camera?

1. Can't find IP camera when you use search software

Foremost, rechecking whether power supply and Ethernet cables are connected correctly. If the problem still exists, checking the network setting for IP camera and your computer/Laptop/tester. Go to network connection, configure IP address to same IP segments, Subnet mask and default gateway must be same for both IP camera and computer. Ensuring IP camera and computer are in the same router.

2. Can't visit IP camera from Internet (WAN)

For this problem, there are two possible factors. Firstly, there is no port mapping for IP camera. As we know, IP camera requires port mapping for remotely access from Internet (WAN). Without port mapping, IP camera is only accessible from local network (e.g 192.168.1.20). To solve this problem, you just need to log in your local router, and enable port mapping for IP camera in virtual server menu. Secondly, if you use domain or DDNS service, making sure the domain point to correct IP address with correct port number.

3. Connect 4 IP cameras, but only one IP camera displays images

This problem occurs when you didn't change the default IP address of IP cameras. After you bought the IP cameras, all of them were configured with a same IP address. With reason of IP conflict, when several IP cameras connect to router, one camera can work, but the rest of cameras can't connect to network. To solve this problem, you need to set an unique IP address for each of cameras.

How to change IP address for the IP Camera ?

Accessing the camera with default IP address (e.g 192.168.1.20), then login with default account information. Go to "Device Config", then choose "Network", you can change the IP address for the camera.

4. PoE IP camera can't see at night (dark images)

Insufficient power supply, which caused the PoE IP camera can't turn on Infrared illuminators, thus images are black at night. PoE (Power over Ethernet) is useful technology which greatly reduced the cost on IP camera installation. But it also has drawbacks; the voltage will drop when PoE IP camera connects to a PoE Switch or NVR. Typically, IEEE802.3af standard PoE only can transmit 20-30 meters. To solve this, user should use high quality Ethernet cable, or shortening the connection distance.

5. Video delay (video latency) when watch live video

Since network camera need to compress the video, before broadcast over Internet, every IP cameras encounter video latency, which is a common problem in IP video surveillance system. To minimize the video latency time, you can increase the bandwidth through upgrading your network infrastructure, also you can lower the bit-rate of streaming. Lowering the image resolution also helps to reduce the video delay time. Increasing the fps can allow IP camera output smooth video.
Do you experience any of these problems? Please make comments if these information is useful to you. If you experienced other problems which are related to IP camera, please write it down in below comment section.

6. IP camera can't display images

If your IP camera can't display images, also you are not be able to access the IP camera, likely the IP camera doesn't boot correctly. Almost IP cameras work with DC12V power supply, power requirements are different. You can estimate the power requirements on the basis of IR range.
·        No IR, or IR range within 20 meters: Required Power Supply DC12V 1A
·        IR range is within 20-30 meters: Required Power supply DC12V 1A
·        IR range is within 30-50 meters: Required Power Supply DC12V 1.5A

Please note: A regular PoE switch, supports IEEE802.3af, this standard only provides maximum 15.4W power, which means the provided current is 1.25 ampere. In conclusion, the regular PoE switch only can work with IP cameras which require no more than 15.4W power.

7. How to upgrade NVR firmware

If your IP camera connects to NVR, not all problems are caused by IP camera. Sometimes, the problem was caused by NVR. You may solve the problem through upgrading or updating NVR's firmware.
To update the firmware, you need to get the firmware file in a USB stick, which then has to connect USB port of NVR for upgrading.
Step 1. Go to "System Setting", choose "System" > "Upgrade"
Step 2. Select the firmware file, then click "Upgrade".
Step 3. When upgrading succeed, the NVR will reboot.

8. NVR can find IP camera but can't display image

If IP camera can be found through automatically search on NVR, this means the IP camera works properly, NVR detected and received correct video streaming parameters from IP camera. If your NVR shows video abnormal, you need to check the video resolution setting for both IP camera and NVR. The video resolution should be same as the NVR's recording resolution. If you use our IP camera and NVR, you need to choose the system's recording resolution as in below picture:
Choosing appropriate main stream and sub-stream resolution

Friday, June 3, 2016

Attendance System based on Biometrics

Attendance System based on Biometrics

If you are still using paper and calculator to prepare the salary of the employees then you are wasting your valuable time and missing the benefits of biometric attendance systems. In this era of modern technology, monitoring attendance of each employee to payroll activity has become seamless.
What is Biometrics Technology?
The Biometrics technologies used to measure and analyze personal characteristics, both physiological and behavioral. These characteristics include fingerprints, voice patterns, hand measurements, irises and others, all used to identify human characteristics and to verify identity. These biometrics or characteristics are tightly connected to an individual and cannot be forgotten, shared, stolen or easily hacked. These characteristics can uniquely identify a person, replacing or supplementing traditional security methods by providing two major improvements: personal biometrics cannot be easily stolen and an individual does not need to memorize passwords or codes. Since biometrics can better solve the problems of access control, fraud and theft, more and more organizations are considering biometrics a solution to their security problems. Biometrics gives you an alternative and higher security compared to passwords or pin identification due to the fact that passwords and pin #s can easily be compromised.

Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience. Biometric devices, such as fingerscanners, consist of:
Ø A reader or scanning device
Ø Software that converts the scanned information into digital form and compares match points
Ø A database that stores the biometric data for comparison

To prevent identity theft, biometric data is usually encrypted when it's gathered. Here's how biometric verification works on the back end: To convert the biometric input, a software application is used to identify specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered into the scanner and authentication is either approved or denied.

What is Biometric Attendance System?
Biometric time attendance system used to track each and every person coming to your place is actually who he claims to be or not with its time and other details. It uses finger and face recognition system to verify person's identity and record its time-in and time-out with all required details.

Benefits of Biometric System
Ø It has many advantages over conventional time tracking used at organizations. Typically such organizations maintain a register book, where people entry their name, time-in, time-out and other required details but the problem with this manual system is inaccuracy, time consuming, unreliable and most important is less secure.
Ø Biometric time attendance is very user friendly and easy to use; any person can use it very easily. It is very fast also, user has to see once in front of system and all details including its time will be recorded automatically. In this way it saves lot of time and still record details very accurately. One can avoid early punching, late punching and buddy punching very easily.
Ø Many schools, college used Biometric Time Attendance to track their student's attendance. The Biggest advantage of Biometric Time Attendance over manual tracking is better security. Many shops and shopping mall use biometric time attendance for security purpose and it really works a lot.
Ø If someone wants to use it for business or organization, then they can easily integrate it to payroll systems, account systems and billing systems. So in that way it is very flexible also and it also shows that time attendance system can be used for all type of business and organizations with great flexibility.
Ø In a nutshell biometric time attendance solution permits you to focus on your core business by giving quickest and easiest way to overcome your time tracking issues.

Return on Investment in Biometric System Installations..

Biometric time clocks, which are used to record employee start and end times, are popular in organizations where security is an issue, or where employees may falsely record their time worked. Because biometric technology is more expensive than other forms of time clock identification, such as magnetic badges or personal identification numbers, it is important to evaluate the potential return on investment should biometric devices be installed. In service environments where employees punch in and out to work, return on investment can be considerable because biometric devices virtually eliminate the ability of employees to “buddy punch.” 


In buddy punching, an employee either types a tardy employee’s PIN or swipes the tardy employee’s badge earlier than he arrives to work or after he leaves work. The organizational costs of this kind of time theft can be enormous. The company loses money a few minutes at a time compounded across departments and locations. Biometrics makes it almost impossible for employees to defraud a time and attendance system. 



Other returns on investment can be gained through the use of the biometric system as a security access monitor, as well. In this case, the biometric system is used to grant or deny access to restricted areas. The cost of purchasing and maintaining magnetic or proximity identification cards, which do not prevent fraudulent access, can be eliminated.

Thursday, May 26, 2016

Manually Register MSCOMCTL.OCX

Manually Register MSCOMCTL.OCX Using  Microsoft Register Server

As a technical person, technician / Engineer / Sales Manager ask " my customer is faceing ocx file registration issue" how it resolve, it append when Engineer install Access Control Software / Time & attendance software in a Microsoft PC.

When you install software that uses the MSCOMCTL.OCX dependency, the software should automatically register the file for you. In some cases your OCX file may not register properly, and as a result, will provide a "MSCOMCTL.OCX not registered" error. Fortunately, you can use a built-in utility called "Microsoft Register Server" (regsvr32.exe) to re-register your MSCOMCTL.OCX file.

How to re-register MSCOMCTL.OCX from an elevated command prompt (Windows XP, Vista, 7, 8, and 10):

1.Click the Start button.
2.Type "command" in the search box... DO NOT hit ENTER yet!
3.While holding CTRL-Shift on your keyboard, hit ENTER.
4.You will be prompted with a permission dialog box.
5.Click Yes.
6.Type the following command: regsvr32 /u MSCOMCTL.OCX.
7.Hit ENTER. This will UN-REGISTER your file.
8.Type the following command: regsvr32 /i MSCOMCTL.OCX.
9.Hit ENTER. This will RE-REGISTER your file.
10.Close the command prompt window.
11.Re-start the program associated with MSCOMCTL.OCX error. 

Saturday, May 7, 2016

Why Hackers Love Public Wi-Fi

Why Hackers Love Public Wi-Fi
On the occasion of World Wi-Fi day the realisation has become strong that people are easily connected with each other globally. Modernization has brought a lot of changes around the world and now India is getting integrated in this process fast. Indians have come to know the value of Internet; now we can find Wi-Fi installed in each and every house in the metropolitian cities as well as in small towns. Nowadays, we can see free public WI-Fi which is widely and readily available in places like airports, restaurants, coffee shops, libraries etc. We all run for free things as we run for free internet connection as well. As we all know, using free internet connection can be the best way to access online accounts, catch up on work and check emails as well. However, there are many security risks involved which could not be ignored, since you could be an easy target for hackers while placing your information which can be a risk. Online crimes are taking different forms which we have come across and according to The Norton Cybersecurity Insights report has revealed that 77 percent of Indians would feel devastated if their personal financial information were compromised and 52 percent actually have either personal experienced of a credit card fraud or know someone who has. With public Wi-Fi available everywhere, what seems like a convenience can actually put you at a great risk. Free public Wi-Fi is a hacker’s playground for stealing personal information.To avoid becoming one of the victims of Cybercrime, we need to enhance our knowledge regarding Wi-Fi.
Risks of public Wi-Fi and how to stay safe online
Man-in-the-Middle Attack

One of the many dangers of using a public Wi-Fi network is that data over this type of open connection is often not encrypted and unsecured, leaving you vulnerable to a man-in-the-middle (MITM) attack. What is an MITM? It’s when a cybercriminal exploits a security flaw in the network to intercept data. Essentially, this gives a hacker access to sniff out any information that passes between you and the websites you visit — details of browsing activities, account logins and purchase transactions. Your sensitive information, such as passwords and financial data, are then vulnerable to identity theft.

Rogue Hotspots

Another risk of using free public Wi-Fi is that you may be connecting via a rogue hotspot. This is an open hotspot, usually with a name similar to that of a legitimate hotspot, which cyber criminals set up to lure people into connecting to their network. Once a victim connects to the rogue Wi-Fi hotspot, the host hacker can then intercept data and even use tools to inject malware into the connected devices.

Better Wi-Fi Security Habits to Stay Safe from Cybercrime

Did you know that 66percent of consumers in India think that using public Wi-Fi is riskier than using a public restroom? Yet, while the Norton Cyber security Insights Report revealed that people are aware of the risks of public Wi-Fi, the survey also showed that people are not practising safe security habits online.

How Norton helps you make it harder for cyber criminals to steal your information on public Wi-Fi:
§   Avoid connecting to public Wi-Fi. If you must use a public Wi-Fi hotspot, also use a virtual private network (VPN) to secure your connection.
§  Don’t log in to password-protected websites that contain sensitive information when using a public Wi-Fi connection — for example, banking and social networking sites, or even email.
§  Keep your software patched and up to date on all your devices — even your mobile ones — to avoid any potential infections by viruses or malware if you do use unsecured public Wi-Fi.
   §   One More Security Habit: Use a Virtual Private Network

   §   A VPN creates a “secure tunnel” where data sent over a Wi-Fi connection is encrypted, making all that data sent to and from your device secure. Using a VPN is a safe Wi-Fi security habit that can protect you when connecting to the Internet on the go.

Sunday, May 1, 2016

Your TV with CCTV Security

Connect Your TV with CCTV Security



Connecting a CCTV camera to a consumer TV is extremely simple and requires only the use of a coaxial or RCA cable to be run from the camera to the TV. Both of these types of cable can be purchased at any electronics store for a low cost.

Instructions 1.

Determine what connections the CCTV security camera has. The TV should have both RCA and coaxial inputs; at a minimum it will have one of them. The CCTV camera will likely not have both inputs. Look at the back of the camera and determine whether it has ports for coaxial or RCA.

Instructions 2.

Measure out the distance from the CCTV camera to the TV. This measurement will be needed to determine the length of cable to purchase.

Instructions 3.

Purchase either an RCA or coaxial cable. Ensure that a long enough cable is purchased using the required measurements. Both of these cables are widely available at most electronics stores.

 

Instructions 4.

Connect the cable to the back of the CCTV camera. A RCA cable will simply be plugged into the back of the camera, match colors of the cable with the colors of the input ports. A coaxial cable will need to be screwed into the back of the camera.

 

Instructions 5.

Run the cable from the CCTV camera to the TV.

 

Instructions 6.

Connect the cable to the TV's input ports. Again RCA cables will be plugged in and a coaxial cable will be screwed in. Turn on the TV, and it should be receiving the live feed from the CCTV camera. The TV may need to be tuned to a different video input or channel to receive the connection, but this depends on the make and model of the TV.