Model LSC-120 Battery Voltage 12V Charging End Voltage 4.4V / 14.1V Maximum PV Panel Open Circuit 25V Maximum PV Panel Short Circuit 25A Continuous Load / Charge Current 20A No Load Current (No Load and PV) 10mA Low Voltage Disconnect 11.5 ü} 0.1V LVD Reconnect 12.5 ü} 0.1V Temperature Compensation -0.025V / ¯C Dimension (L x W x H) 134.2mm * 58.4mm * 33mm Weight 200g
Features : Designed for optimum use in residential and commercial grid-tied applications. Bad weather withstand junction box Crosslink cable and low connection losses connectors. Utilizing advanced technology and automatic production. Complete test : hot-spot endurance Insulationíboutdoor exposure : uv Preconditioning humidity-freeze Damp heat thermal cycling : robustness Of terminationsíbwet leakage currentíb Loading bhail impact. Manufactured in ISO 90012008 certified Facility. Warranty assurance 12-year of 90% power output 25-year of 80% power output 5-year of materials and workmanship Cell configuration 60 in series Cable length :1000 mm dimensions 1629x989x47.5mm Weight :19.0 kg
Aero form intake With carbon fiber look air filter Increase air flow and raise engine power .
Gt wings (spoiler) There are all type of spoiler Aluminium Carbon fiber spoiler with irregular type Carbon fiber spoiler with straight type.
Truck air intake
HTTPS/SSL Network Forensics Device (HTTPS/SSL Interceptor) is designed specially for forensics purpose where it is used to decrypt HTTPS/SSL traffic. It can be used by legal enforcement bodies, police, investigation units, forensics firms, government departments for tracking or monitoring suspects HTTP and HTTPS activities (through Internet). HTTPS/SSL Device has E-Detective web reconstruction function (HTTP Link and HTTP Content) integrated into the system which allow the administrator to see the web page content of normal and secured web page. HTTPS/SSL Interceptor can works in two modes: 1. Man in the Middle Attack (MITM); and 2. Offline Method (Decrypting HTTPS raw data with Private Key Available). In MITM method, it acts as a proxy to the targeted PC/suspect. All traffic from the targeted PC or suspect will be redirected to the HTTPS/SSL Interceptor. Therefore, it can collect the genuine certificate from SSL Server if the targeted PC access to the SSL Server. At the mean time, the HTTPS/SSL Interceptor returns with its own generated certificate. In this method, it allows the HTTPS/SSL Interceptor to decrypt the HTTPS traffic. In Offline Method, with the HTTPS raw data captured, HTTPS/SSL Interceptor is capable to decrypt the traffic if the private key is available. Login usernames and passwords like Google or Gmail login, Yahoo Mail login, ebay login etc. can be captured by the HTTPS/SSL Interceptor.
Decision Group launches VOIP-DETECTIVE, VOIP interception and reconstruction tool in 2009. This tool is capable to capture, decode and reconstruct VOIP sessions (RTP sessions). It allows the play back of voice calls on network. Besides, all the voice calls content can be stored and backup for further reference purpose. The supported protocols include SIP (technology that is most commonly used) and H.323. The supported CODECs include G.729, G.711-a law and G.711-u law, G.723, G.726 and ILBC.
E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes and reconstructs various types of Internet traffic. It is commonly used for organization Internet and behavioral monitoring, auditing, record keeping, forensics analysis and investigation as well as legal and lawful interception for lawful enforcement agencies such as Police Intelligence, Military Intelligence, Cyber Security Department, National Security Agencies, Criminal Investigation Agencies, Counter Terrorism Agencies etc. It also provides compliance solution for many standards or acts like Sarbanes Oxley Act (SOX), HIPAA, GLBA, SEC, NASD, E-Discovery and many others. E-Detective is capable to decode, reassembly and reconstruct various Internet applications and services such as Email (POP3, IMAP and SMTP), Webmail (Yahoo Mail, Windows Live Hotmail, Gmail etc.), Instant Messaging (Yahoo, MSN, ICQ, QQ, Google Talk, IRC, UT Chat Room, Skype), File Transfer (FTP, P2P), Online Games, Telnet, HTTP (Link, Content, Reconstruct, Upload and Download, Video Streaming), VOIP (optional module) etc.
Wireless-Detective is a complete and comprehensive Wireless LAN (WLAN) legal interception and forensics investigation solution for the intelligence related units/agencies such as police, military, criminal investigation department, national security department etc. In fact, it is the most reliable solution to trace, identify all illegal Wireless LAN Internet activities or transactions and preserve all of this evidence. Wireless-Detective is the smallest and lightest WLAN forensics investigation tool available. It consists of a small laptop (12.1 inches monitor screen) with Linux base OS integrated with Wireless-Detective software installed. With that small size (mobility), forensic professional can easily carry it out to any places (such as restaurant, shopping mall, airport, café, hotspot etc.) for legal interception and forensics investigation task without the notice of the public and most importantly, the suspect/target won¡¦t know about it. With the capability to scan all WLAN channels (802.11a/b/g 2.4 GHz and 5 GHz frequency bands) to capture/sniff WLAN traffic from available Wi-Fi networks, decrypt WEP encrypted (WPA-PSK optional module) wireless network (automatically or manually), decode and reconstruct captured WLAN raw data, store the raw data captured and store the reconstructed data in its database, and display them in the original and exact content format, it make it the most complete (All-in-One) WLAN interception and forensic investigation tool. Furthermore, the Wireless-Detective user management interface or GUI (accessed through a browser) is very user friendly, easy to operate and manage. Wireless-Detective is capable of decoding and reconstruct WLAN Internet traffic in real time such as Email (POP3, SMTP, IMAP), Webmail (Gmail, Yahoo Mail, Windows Live Hotmail etc.), Instant Messaging/Chat (MSN/Windows Live Messenger, Yahoo Messenger, IRC, ICQ, QQ, UT Chat Room, Google Talk Gmail, Skype Voice Log), FTP, P2P, Online Game, TELNET, HTTP (URL Link, Content, Reconstruct, Download/Upload, Video Stream) etc. After the decoding and reconstruction of the captured traffic, it displays them in its menu list according to different protocol/category types in exact or original content format. With capability of search by keyword or search by parameter (conditional search), it allows further forensics investigation and analysis to be carried out. This has proven that Wireless-Detective is an All-in-One system (all WLAN investigation work is conducted in one machine) that can speed up the entire investigation process.
Building intercom system, desktop video door phone, black & white or color video wall mount phone, villa / mansion door phone, apartment phone hotel door phone. Boxes.
Eco paper is made from abundant stone powder and some non-toxic resin heated by electricity. íºstone paperí¿cause a better global to live for there is no tree cutting, no water or air pollution. Stone paper character: 1. Very elastic and soft 2. Exhancellent abrasion resistance 3. Waterproof 4. Marproofp 5. Can 100% recovery is reborn. Our eco paper products include all kind of notebooks, shopping bag, gift box, card set, bag, note pad....
D2 spot FOB Rotterdam or Houston via blue screen procedures. 30M mt
Pushing action Ball pen with LED light. LED light have red, blue, green, white or rainbow color.We have patents of many countries. pc/poly, 500pcs/ctn
Ball pen with tape measure 500pcs/carton
Finger print time attendance with access control User capacityG 1500/2200/2800 TransactionG 50000/80000/100000/120000 Verification modeG One to one or one to more Access ControlG 50 Time ZoneA5 GroupingA10CombinationAHoliday ManagementAsupport many fingerprint accessAintimidate fingerprint access grade security managementAsupport standalone work ElectrocontrolG Directness relay output 3A/12VDC or encrypt Electrocontrol output* IntrgrationG Integrate Proximity Reader(ID) or Contactless Smart Card Reader(Mifare) CommunicationG RS232ARS485ATCP/IP Keypad Or DisplayG LCD with 80 character and figure keypad, wireless doorbell PowerG 9-24V DCAstay currentG0.50 mAAwork currentG400 mA Validating SpeedG =2 s FRRG =1% FARG =0.0001% Baud rateG RS232G115200 RS485G115200 TCP/IP(RJ45 interface) SensorG ZK sensor U.R.U sensor Operating TemperatureG 0óXC - 45óXC Operating HumidityG 20%-80% AuthenticationG CEAFCCAMA Management softwareG Transaction fingerprint manage ment and Access control attendance options and network management LanguageG EnglishB Simplified chineseBTraditional chinese SizeG 150]L^*145]W^*38.5]H^mm one unit/Box
School stationery
Handcuffs Stainless steel handcuffs; steel handcuffs; legcuffs Standard size and large size
Hdmi switcher (4in 1out) Size:170(v)x73(d)x25(h) mm Version: 1.2 & 1.3 Hdmi source input port:hdmi single link, tmds, 4 port Display device output port: hdmi single link, tmds, 1 Interface: dc power jack x 1 ; hdmi input connector x 4 ; hdmi output connector x1 Single link range: vga/svga/xga/uxga ; 480i/480p/720p/1080i/1080p Net weight: 330g
8" Dia.x8" Long Aluminum housing 15Watts,8 Ohms Freq. Range:400-8k Hz 12pcs/carton meas.4.6 cuft
Siren for car alarm system, home security system Dia. 3-1/2"x4" Long, 10Watts 12V.DC S.P.L. 110dB 40pcs/carton MEAS. 2.2 cuft