rory
Member-
Content Count
20 -
Joined
-
Last visited
Content Type
Profiles
Forums
Calendar
Everything posted by rory
-
simple program to grab a list from a text file, or just hard code the list in the exe ... and add them to the IE Trusted Sites Registry Entry
-
2ghz 512ddr here, and I develop on it .. works fine .. plus run a DVR minimized .. 2 channels .. Okay ..i also got a 3ghz here now ..
-
eat there every day, but im a sucker for the regular macchicken sandwich and fillet o fish .. spicey chicken? I can get that on every corner down here ..
-
Help me find something as good or better than go1984...
rory replied to sorka's topic in DVR Cards and Software - PC Based Systems
take a look at LuxRiot, much better than the one you mentioned. -
Please keep it clean guys, thanks.
-
here are some H.264 Stand Alones. [WELL 1 DOWN - HOW MANY LEFT ] www.cctvhowell.com/en/list.asp?id=191 http://www.enxun.net/product/enshowjianjie.asp?id=546 http://www.safeol.com/okwell/english/products/RTOS%20DVR.htm (up to 24 ch video/40 ch audio) http://www.mirak.com.cn/Digital_Stand-Alone_01.htm http://www.atone.cn/en/ProductShow.asp?ArticleID=113 http://www.catchview-electronics.com/productInfo.asp?ProductID=195
-
from: Symantec Security Response "A virus is a program or code that replicates itself onto other files with which it comes in contact; that is, a virus can infect another program, boot sector, partition sector, or a document that supports macros, by inserting itself or attaching itself to that medium. Most viruses only replicate, though many can do damage to a computer system or a user's data as well." "A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail." "A Trojan Horse portrays itself as something other than what it is at the point of execution. While it may advertise its activity after launching, this information is not apparent to the user beforehand. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls." ..
-
Oh lawd .. right next door .. gun shot after gun shot ... duckin beneath the keyboard as dont know what is what ,... EDIT: Cops on the way, something serious going down ... too many home invasions this time of the night around here ... first gunshot was like right outside the door .. then there was a burst of slightly more distant ones ... closed the front door quick ... worst part is juz waiting and not knowing what is going on ... ..
-
Thanks Colin, I'll look through it when I get back on Thursday, meanwhile, alot of that is actually in the PDF already ... except that the article isnt geared towards setting up a network, or DVR for that matter - this is for a home/business PC only. Also, this is all based on starting with a default Windows XP install, so something like 32 bit is default. As for formatting, etc, dont go into too much depth as thats where we, you, come in to help them. Thanks Rory
-
Document on Tweaking Windows - any changes / additions please let me know Derived from what I do to my DVRs ... Thanks.. http://www.bahamassecurity.com/uploads/XP-TWEAKING.pdf
-
hurts my poor eyes reminds me of a colleagues install down here, he did all 14 wendies with eclipse CCTV's cheapest cameras ... i just couldnt look at them anymore .. i felt so depressed ..
-
Yep, thats when I utilize their in house IT or seperate it at the Modem.
-
If its a Network set up I dont know, I would just outsource. Stick to what you do best and perfect that. Specialise, thats where its at in this day and age with so many new companies and cheaper products poping up left and right. Normal Remote Setups dont require any serious knowledge of networks besides plug, play and port forward.
-
looks like some mace cams?
-
Dont need IP for that, you can simply use something like NVT. And trenching can always be done, unless they are being cheap.
-
Havent had to support one since I started installing the PC systems back in august. Mind you they are all on Voltage Regulators.
-
In this case, yes it is totally for PC Based DVRs with Windows XP SP2. This is geared towards Speed for Standard PC systems, though here is the original for DVR setup, which cuts out alot of other things also. http://www.cctvforum.com/viewtopic.php?p=36977#36977 Suggestions are welcomed ... thanks Rory
-
Arecont Vision 3 megapixel cameras
rory replied to GrahamM's topic in IP/Megapixel Cameras and Software Solutions
Tamron should produce great images. Otherwise I Prefer Fujinon, but Computar is also a high end lens. POE may be the issue though - only a 12VDC camera ... also try powering it from a 12VDC power source at the camera. Either way, they arent really CCTV cameras, and they suggest Computar Mega Pixel Lenses. Rory -
Yeah if all the dealers want to pay something for that kind of service then ... well .. it will have to stay the way it is ..
-
That sucks for distributors, but its a great product for dealers and end users, they do provide a warranty.
-
an FYI. most of the cheap taiwanese and Chinese embedded Boards/systems are developed in Korea by the same company.
-
They are actually 800TVL now ... and thanks .. off to bed now .. away for 3 days tomorrow
-
Hmmm, I know GE DVRs use the Nucleus RTOS from Accelerated Technology, and Power PC boards ... http://www.acceleratedtechnology.com/embedded/nucleus.html
-
ahhh , yah can make it fit i know yah can ... push it till it breaks ...
-
plug and play is all I can say ...