Taming The Blog Monster

My journey into blogging

Monday, September 25, 2006

Catchup

0 1 2 3 4 5 6 7 8 9 10 11 12 13


Tonight I went back and did an outline for my Security blog to try and give it(me) some clarity on where I'm going with what I'm writing.

I spent some ime reading through the Google Adsense tutorial and Terms and Conditions in
preparation for monetization.
I didn't however get onto the next step of Yahoo PING setup. (Naughty! I shouldn't have jumpped ahead of the e-book! "Baby-steps" Colin, "baby-steps")

I caught up two days worth of blogging by finishing off last nights one and publishing a seperate one for tonight as well.
Now Ive just got Tuesday nights' one to do on the train tomorrow and that should leave me time for the Yahoo PING bit !

The security blog outline thus far is:

Blog Outline

#1 Welcome to my blog on all things security related
The intent of this blog is to provide a forum for discussion of all aspects of security, electronics and computing which people may find interesting.

  • Physical security of premises
  • Security of computer data from corruption, theft or malicious intrusion by virus or hacking
  • Video and perimeter security systems
  • Security of power supply during attempted robbery or storms


#2 Beaten by security - that's a good thing - really !
Laptop security problem

#3 Laptop security issue resolved
Discuss resolution and brief comment on ZAIS and NIS.
Added affiliate links for both ZAIS and NIS

#4 First Aspect of Security - Power
Things to be covered
1. Premises security and it's dependence on power
2. Digital electronic equipment and the effect of power loss(and subsequent restoration).
3. Data security during power outages.
4. Physical/personal security without power


#5 Premises security (part 1) System Types
Need of battery supply and recharging
Size and cost mean minimal battery backup

Five levels of security in two broad types – local / monitored

  • closed-circuit video / perimeter detection / on-site guards
  • closed-circuit video / perimeter detection / off-site monitoring
  • video OR perimeter protection / off-site monitoring center.

Three examples of "monitored" or "back-to-base" systems

  • video AND perimeter detection / NO off-site monitoring.
  • video OR perimeter protection / NO off-site monitoring.
  • Perimeter-only detection being the most basic

Three examples of "local alert " systems

"local" systems,
several sub-categories.
1. audible and/or visible.
2. video capture system.

Monitored systems alert on lost power / low battery

#6 Premises security (part 2) Local vs Monitored also Use of Video Survellience
Local can be disarmed by power removal
Serious installs use monitored and power backup
Most local go unattended – lack of police
Best “local” combines perimeter and video

Explanation of perimeter – devices in path of entry – physical perimeter breach
· closure detectors
· Glass breakage
· Pressure mats
· Infra-red beams

Explanation of monitors – devices which watch for movement or change within an area
· Passive IR movement
· Proximity
· Infra-red beams
· Moisture or Noise detection
· Video Cameras

Benefits of cameras
Video recording methods
Different cameras

Non-affiliate info links to Dick Smith, Jaycar, ZTV/AEE

“More about the pros and cons of wireless security in a later blog.”

In the next installments,
setting up video security using your home computer
remote-monitor your site via the internet.
risks of doing remote monitoring

#7 Premises security (part 3) Wired or Wireless ?

Poor light-handling ability of cheaper cameras

First of the topics
Wireless vs. wired

Both types are vulnerable
Number of wireless systems
Reputable ones have jamming detection
Plug for LYNX Ademco

Main differences wireless vs. wired
Cons
Battery maint.
Remote intrusion poss.
Dearer sensors Cabling costly
Still need power Batteries expensive NiMH
Interference prone
Pros
Suit difficult sites Intrusion difficult
Easy install Cheaper sensors
Fast install Central power source
Better picture quality

Care needed on what’s monitored as it may be a “theft invitation”

#8 Premises security (part 4) Using Your Computer for DIY Video Surveillance

A look at DVR’s
Discussion of Lux
Positioning the cameras
Connecting cameras to a DVR
Using a PC as a DVR
Connecting cameras to a PC
Surveillance Software for a PC
Live video output from cameras to a monitor.

#9 Premises security (part 5) Remote monitoring & it’s risks



#10 Premises security (part 6) Non-video device monitoring



#11 Premises security (part 7) Power security for monitoring systems



#12 Premises security (part 7) UPS Power