Jump to content
Security Installer Community

sixwheeledbeast

Global Moderator
  • Posts

    8,719
  • Joined

  • Last visited

  • Days Won

    141

Everything posted by sixwheeledbeast

  1. It is advisable to use a static IP that is outside of the pool over DHCP. This sounds like a server side issue that happens on occasion. Linked into your own DDNS service or Static IP with Update IP off is best solution IMO. There is setup required on the panel and with the web interface. If you follow the manual word for word and you understand the terms you shouldn't go wrong. I would switch off the COMWiFi local network while in the interface configuring it. If you do get the ARP issues you mention above and are not sure on clearing them, you can simply reboot everything wait for connection to come back up and then continue.
  2. As petrolhead says and also the listing -> "This cable functions as a signal transmitter, but NOT a signal converter." You need to convert to a composite signal to use the existing modulator. They probably doesn't get used, some are for playback purposes only anyway.
  3. Granny Goggins is most likely listening to The Archers? But yes I have been in that situation explaining how to switch HDMI channels for the sake of the cost of a separate monitor.
  4. If it's as simple as pressing the TV/DTV button on a remote, what's the issue? The image quality will not be HD but it will work like before.
  5. Baluns and POE? If analogue use multiple CAT5's, if IP consider a POE switch?
  6. If you are converting HDMI to a composite signal then the analogue modulator should work fine. Is this the Luxrite LHD DVR or the SPro Six? Also AHD CVI and TVI are analogue but they are not composite BTW.
  7. Dunno I don't like Hik so rarely play with one.
  8. Is Router login and DVR trying to use same http port?
  9. FYI A number of vulnerabilities have been discovered in the Qualcomm chipsets used in many Android handsets from many of the leading manufacturers. Exploitation of these vulnerabilities could allow an unauthorised user to take full control of an Android device but in order to do so an authorised user would first need to install a malicious app. https://www.cert.gov.uk/resources/advisories/advisory-quadrooter-vulnerability-affecting-android/ http://www.cnet.com/news/quadrooter-security-flaws-said-to-affect-over-900-million-android-devices/ http://blog.checkpoint.com/2016/08/07/quadrooter/
  10. Yes, static IP or Dynamic IP you will still need port forwarding unless your using peer-to-peer. Portforward.com is a good start.
  11. I'd rather have a 20 year old scantronic than some modern 1 way wireless tat. All about the risk? Seems like a simple swap like for like, it's the same reason obsolete keypads sell well on ebay. Very easy to swap something like for like, although I have known "engineers" to get this wrong.
  12. I imagine you need to setup port forwarding or the like on your router to view remotely?
  13. Then it will no longer be a 16 ohm speaker?
  14. Do we get paid for contributing on here now?
  15. DDNS service? Have two static IP's on DSL at Site 1 and VPN 3G site 2 to the other static IP?
  16. Do NSI actually bother to check if companies use approved subbies? It would appear not from my experience.
  17. It would appear the battery has gone faulty and used your issue. It's possible that the unit is faulty, would be best to have it inspected to make sure the panel has kept it's programming and the panel isn't damaged. A new battery maybe all it needs but without proper testing you will not know if it's likely to do it again.
  18. Wire the original speaker back in place and forget the sound bomb they are rubbish anyway...
  19. Tag is Yes or you could enable auto yes. Would only need for part sets and omitting.
  20. If your using prox tags you shouldn't need to open the flap at all, unless you need to omit etc.
  21. All encryption can be compromised with enough computing power, having strong passwords is the key to stop attacks. A 128 bit AES key would take billions of years to brute force. WEP and some WPA can be exploited much easier than a WPA2 connection, WEP was flawed in many ways and WPA was a backwards compatible plaster for WEP. All WiFi should be WPA2 which uses AES 256 bit encryption for maximum security. Any site that would share guest access with the rest of the network is asking for trouble.
  22. Opening ports is not the issue IMO it's allowing unencrypted connections within the setup of the app. The COM-IP is very basic so I doubt it's possible to use to pivot attack. When you open a port you increase your attack surface but it doesn't necessarily make you more vulnerable. I recall a similar discussion a while back and layers were mentioned, all security should be in layers and not just on the web.
  23. It's all dependent on the risk, it's unlikely that IP is an attack point for a domestic system at the moment. While I agree security should be at it's best it's likely any burglar will storm in smash stuff to bits and take what they want before you even know what's happened. I would never recommend setting a system via an app but it's what customers want and that's why it's provided as an option.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.