Sudden light should consistently light up for 45 seconds to shut off Infrared Color at daytime. Under low illumination or at nighttime, infrared activated immediately and system automatically switched to B/W Burst signal is switched off while shifting to B/W at nighttime Auto electronic shutter High sensitivity Project distance 30M 1pc/box, 20pc/2.72'
Allow a single monitor to display the output for one to eight cameras in automatic or manual sequence Each camera can be positioned in areas where user wants to surveillance The scene from each camera is displayed on the monitor for an operator-selected dwell time from 1 to 35 seconds. Green led lamps indicate the position number of the camera output bring viewed. Unused camera positions may be bypassed without changing the order of sequence or dwell time Designed to meet the needs of the small, basic closed-circuit video system user Housed in a heavy-gauge steel chassis and cover protected by an off-white textured baked enamel finish CV-123-8A is with Audio 1pc/box, 10pc/2.3'
Suitable compensation to signal attenuation when the video signal is transmitted for long distance via coaxial cable 0-7 levels adjustable for different signal attenuation and different cable distance Color Gamma compensation goes along with 0-7 levels 1pc/box, 10pc/2.3'
Built-in zoom lens control and velocity adjustable A single joystick is easy to control the PAN/TILT scanner Manual Pan or Autopan is possible Paddle switch control of Iris, Focus and Zoom Lens are isolated for easy operation 1pc/box, 10pc/2.3'
Sudden light should consistently light up for 45 seconds to shut off Infrared Color at daytime. Under low illumination or at nighttime, infrared activated immediately and system automatically switched to B/W Burst signal is switched off while shifting to B/W at nighttime Auto electronic shutter Y/C separated circuit designed, color signal is off at night Project distance 15M 17 Pills of high efficient LED 1pc/box, 20pc/2.72'
1CH video input, 6CH output Circuitry with individual and isolated complementary transistor pairs provides power for several 75 Ohm loads. Channels will not interfere with each other when short circuit occurs. 1pc/box, 10pc/2.3'
Intensified alum. Alloy housing to enhance cooling effect Built-in icr Megapixels board lens, standard 3.6mm (optional 6.0¢p, 8.0¢p) 3dnr/2dnr Agc, white balance control and back light compensation functions (optional) Wdr auto Using dc 12v power source, ir function activate, project distance approx. 20m (single cable transmission without ir function) 1pc/box, 20pc/2.72'
Auto electronic shutter Simple and quick wiring for field or building operation Power source: applicable for both single cable drive unit/dc 12v (can only choose one application either single cable drive unit or dc 12v Brilliant color High sensitivity Compact and light weight Ntsc and pal system Back light compensation 1pc/box, 20pcs/1.7'
Handle loads up to 7kg Drive motors provide operational stability with minimum coast With instant start-stop characteristics Slow speed¡ahigh-torque motors stand in a low noise level Pan rotation is controlled by a permanent stop for nearly 355 degree rotation 1pc/box
Automatically track object mode Zone (overstep) tracking mode Timing tracking mode Alarm tracking mode Activity detection mode Perfect manual & auto incorporate tracking G.W.5kgs
BF-630 is one of CHIYU Technology's Fingerprint, single door access controller with Web Bbased. Ideally, BF-630 is used to manage entrance security or a small office as a simple time attendance recorder with Fingerprint or RFID and Password. IP Based with embedded Web Server Optical based fingerprint sensor Lower power consumption, OSD menu (On Screen Displayer) Voice indication module option Fire Alarm/ Door Sensor USB device option (for logs extraction) Double Badges and Interlocking Anti Pass Back unlimited levels Fingerprint + Pin/ Card + Password/ Lock Release/ Exit button Time zones 50 Holidays/ 40 Function Keys/ 32 Departments,Designations, Groups 64 Time Sets and Time Zone ► Technical Specification Verification Option Fingerprint Fingerprint + Card Fingerprint + Pin Card + Pin Fingerprint + Card + Pin Verification Mode 1:1 /1:N Verification Time Less than 2.0 sec Registration Time Less than 3.0 sec Capacity 950 persons, totally 1900 templates (2 templates/ Users) Log Data 32,768 System Log 2,000 Relay Output 2 Reset Button 1 Sensor Input 1 Communication Interface RS-485×1 →Relay Box (BF-20/ BF-50) TCP/IP (Reserved for internetworking) WG In & Out 26/ 34 bit Communication speed Ethernet 10/100M, Auto crossing Card format 125 KHz (EM/TM) 13.56 MHz Reading Range 7 ~ 12cm (EM/TM) 3 ~ 5 cm (Mifare) Language Traditional/ Simple Chinese/ English Keypad 10 numeric keys (0~9) + 6 function keys (F1~F4,#,*) & 1 Door Bell Display 128 × 64 Dots LCD Operation Temperature 0℃~ 65℃ Operation Humidity 5% ~ 95%RH Dimension 125 × 145 × 33 mm Weight 360 g.
Webpass IP Reader is a standalone, IP65 rated weather proof RFID access controller, which can be connected with more than one Webpass readers over single intranet (LAN). Every package of shipped item will be come with SoMAC, a proprietary management software to manage multiple units of Webpass IP Readers in a system. Webpass IP Reader featured both EM or Mifare or mixed (EM and Mifare) system, and it is avaliable for other custom made type project like EzLink, Desfire, HID..etc system Main Features IP 65 Rated Weather Proof Multiple card types support (EM/ Mifare standard) Cost-Effective door controller solution Flexible TCP/IP wiring plan solution provided. Technical Specification Verification option Card Pin Card + Pin Identification option 4, card & Pin/ card/ Pin/ card & personal password User types 4 ( normal user/ administrator/ visitor/ guard touring) Capacity 20,000 cards ( Could be extend to 50,000 cards) Access logs 65,535 System logs 1,500 WG output 1 WG input 1 Fire Alarm Input Dry Connector Yes Built-in 1 set (24V-1A) Built-in Door Sensor 1 sets Built-in Exit Button 1 sets Buzzer 1 sets Reset Button Yes Tramper Switch Yes Support Wiegand Format WG 26/34 Communication Iinterface RS-485 × 1 TCP/IP→PC Communication Distance RS-485 → 1.2 KM TCP/IP → 100M WG → 80M Keypad 10 numeric keys + 2 function keys LED Indicator Ring type LED Holidays 50 sets Time Sets 255 sets Time Zone 120 sets Group 255 sets Power 9~24V (Maximum work rate 3.5W) Languages Traditional Chinese/ Simplified Chinese/ English Operation Temperature 0˚C ~ 65˚C Operation Humidity 5% ~ 95%RH RFID Frequency 125 KHz (EM/TM);13.56 MHz (Mifare) RFID Read Range 7 ~ 12cm (EM/TM),3 ~ 5cm (Mifare) Dimension 120 × 80 × 25 mm Weight 150 g.
*19 inches wide panel *Resolution: 1440(H)x900(V) *Video Compression: H.264 *Channel: 8CH *Display Speed: 200/240 fps *Power: AC100-240V, DC12V(5A) Weight:5.1kg(Without HDD) Dimensions:475(W)x380(D)x85(H) mm(Without Stand)
HTTPS/SSL Network Forensics Device (HTTPS/SSL Interceptor) is designed specially for forensics purpose where it is used to decrypt HTTPS/SSL traffic. It can be used by legal enforcement bodies, police, investigation units, forensics firms, government departments for tracking or monitoring suspects HTTP and HTTPS activities (through Internet). HTTPS/SSL Device has E-Detective web reconstruction function (HTTP Link and HTTP Content) integrated into the system which allow the administrator to see the web page content of normal and secured web page. HTTPS/SSL Interceptor can works in two modes: 1. Man in the Middle Attack (MITM); and 2. Offline Method (Decrypting HTTPS raw data with Private Key Available). In MITM method, it acts as a proxy to the targeted PC/suspect. All traffic from the targeted PC or suspect will be redirected to the HTTPS/SSL Interceptor. Therefore, it can collect the genuine certificate from SSL Server if the targeted PC access to the SSL Server. At the mean time, the HTTPS/SSL Interceptor returns with its own generated certificate. In this method, it allows the HTTPS/SSL Interceptor to decrypt the HTTPS traffic. In Offline Method, with the HTTPS raw data captured, HTTPS/SSL Interceptor is capable to decrypt the traffic if the private key is available. Login usernames and passwords like Google or Gmail login, Yahoo Mail login, ebay login etc. can be captured by the HTTPS/SSL Interceptor.
Decision Group launches VOIP-DETECTIVE, VOIP interception and reconstruction tool in 2009. This tool is capable to capture, decode and reconstruct VOIP sessions (RTP sessions). It allows the play back of voice calls on network. Besides, all the voice calls content can be stored and backup for further reference purpose. The supported protocols include SIP (technology that is most commonly used) and H.323. The supported CODECs include G.729, G.711-a law and G.711-u law, G.723, G.726 and ILBC.
E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes and reconstructs various types of Internet traffic. It is commonly used for organization Internet and behavioral monitoring, auditing, record keeping, forensics analysis and investigation as well as legal and lawful interception for lawful enforcement agencies such as Police Intelligence, Military Intelligence, Cyber Security Department, National Security Agencies, Criminal Investigation Agencies, Counter Terrorism Agencies etc. It also provides compliance solution for many standards or acts like Sarbanes Oxley Act (SOX), HIPAA, GLBA, SEC, NASD, E-Discovery and many others. E-Detective is capable to decode, reassembly and reconstruct various Internet applications and services such as Email (POP3, IMAP and SMTP), Webmail (Yahoo Mail, Windows Live Hotmail, Gmail etc.), Instant Messaging (Yahoo, MSN, ICQ, QQ, Google Talk, IRC, UT Chat Room, Skype), File Transfer (FTP, P2P), Online Games, Telnet, HTTP (Link, Content, Reconstruct, Upload and Download, Video Streaming), VOIP (optional module) etc.
Wireless-Detective is a complete and comprehensive Wireless LAN (WLAN) legal interception and forensics investigation solution for the intelligence related units/agencies such as police, military, criminal investigation department, national security department etc. In fact, it is the most reliable solution to trace, identify all illegal Wireless LAN Internet activities or transactions and preserve all of this evidence. Wireless-Detective is the smallest and lightest WLAN forensics investigation tool available. It consists of a small laptop (12.1 inches monitor screen) with Linux base OS integrated with Wireless-Detective software installed. With that small size (mobility), forensic professional can easily carry it out to any places (such as restaurant, shopping mall, airport, café, hotspot etc.) for legal interception and forensics investigation task without the notice of the public and most importantly, the suspect/target won¡¦t know about it. With the capability to scan all WLAN channels (802.11a/b/g 2.4 GHz and 5 GHz frequency bands) to capture/sniff WLAN traffic from available Wi-Fi networks, decrypt WEP encrypted (WPA-PSK optional module) wireless network (automatically or manually), decode and reconstruct captured WLAN raw data, store the raw data captured and store the reconstructed data in its database, and display them in the original and exact content format, it make it the most complete (All-in-One) WLAN interception and forensic investigation tool. Furthermore, the Wireless-Detective user management interface or GUI (accessed through a browser) is very user friendly, easy to operate and manage. Wireless-Detective is capable of decoding and reconstruct WLAN Internet traffic in real time such as Email (POP3, SMTP, IMAP), Webmail (Gmail, Yahoo Mail, Windows Live Hotmail etc.), Instant Messaging/Chat (MSN/Windows Live Messenger, Yahoo Messenger, IRC, ICQ, QQ, UT Chat Room, Google Talk Gmail, Skype Voice Log), FTP, P2P, Online Game, TELNET, HTTP (URL Link, Content, Reconstruct, Download/Upload, Video Stream) etc. After the decoding and reconstruction of the captured traffic, it displays them in its menu list according to different protocol/category types in exact or original content format. With capability of search by keyword or search by parameter (conditional search), it allows further forensics investigation and analysis to be carried out. This has proven that Wireless-Detective is an All-in-One system (all WLAN investigation work is conducted in one machine) that can speed up the entire investigation process.
Building intercom system, desktop video door phone, black & white or color video wall mount phone, villa / mansion door phone, apartment phone hotel door phone. Boxes.
Ethernet Figerprint, MIFARE Card USB disk port.
Finger print time attendance with access control User capacityG 1500/2200/2800 TransactionG 50000/80000/100000/120000 Verification modeG One to one or one to more Access ControlG 50 Time ZoneA5 GroupingA10CombinationAHoliday ManagementAsupport many fingerprint accessAintimidate fingerprint access grade security managementAsupport standalone work ElectrocontrolG Directness relay output 3A/12VDC or encrypt Electrocontrol output* IntrgrationG Integrate Proximity Reader(ID) or Contactless Smart Card Reader(Mifare) CommunicationG RS232ARS485ATCP/IP Keypad Or DisplayG LCD with 80 character and figure keypad, wireless doorbell PowerG 9-24V DCAstay currentG0.50 mAAwork currentG400 mA Validating SpeedG =2 s FRRG =1% FARG =0.0001% Baud rateG RS232G115200 RS485G115200 TCP/IP(RJ45 interface) SensorG ZK sensor U.R.U sensor Operating TemperatureG 0óXC - 45óXC Operating HumidityG 20%-80% AuthenticationG CEAFCCAMA Management softwareG Transaction fingerprint manage ment and Access control attendance options and network management LanguageG EnglishB Simplified chineseBTraditional chinese SizeG 150]L^*145]W^*38.5]H^mm one unit/Box