Jump to content

StefanB

Members
  • Content Count

    20
  • Joined

  • Last visited

Posts posted by StefanB


  1. Dunno about Sony, but HikVision has, as part of their HD-TVI implementation, incorporated PTZ over coax functionality.

    Bascially, any HikVision HD DVR will be able to control a HikVision HD PTZ via coax.

     

    Way cool, yes?


  2. Nice 'boat', dude! Can't blame people for wanting to get on?

     

    CCTV Systems generally come in 4, 8, 16, 32 and 64 channels.

     

    Have a look at HIKVision's 720p HD-TVI cameras and DVRs. They are well priced and of good quality. They have both VGA and HDMI outputs, so you should be able to use your current monitors.

     

    Daisy chaining cameras are an interesting one. An acquaintance ran a length of multi-strand and 1.5mm ripcord around his house and spliced off (using baluns) wherever he needed cameras, so I guess it can work. But I'd rather suggest you go the normal route and run either RG59 or CAT5.


  3. You might want to have a look at the newer 720p and 1080p HD Analogue cameras.

    Brilliant quality for home use and in most cases you can retain your old wiring. Assuming it is still in good condition.

     

    I am a HIKVision fanboy, so I'd suggest you start with that. Sorry, can't help with pricing since I'm on a different continent. But definitely cheaper than IP!


  4. easiest way is get a BNC-RCA adapter and plug it into the video socket of the AV inputs. If your DVR hasn't got a HDMI output it must be fairly old. If it hasn't got a VGA output then it must be very old.

     

    Assuming you tried this and it didn't work. Make sure that your DVR's output is at a resolution supported by your screen.


  5. The way I read this, the vulnerability is not a user settable parameter/password?

    Manufacturer backdoor of some type?

    Is it still possible to secure your network is a case like this?

     

    “The issue with these particular devices is that a user cannot feasibly change this password,” Flashpoint’s Zach Wikholm told KrebsOnSecurity. “The password is hardcoded into the firmware, and the tools necessary to disable it are not present. Even worse, the web interface is not aware that these credentials even exist.”
×