Alexander Installation and Configuration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Alexander Installation and Configuration Guide Alexander installation and configuration guide. Contents 1. First time installation ................................................................................................... 2 2. Configuration ............................................................................................................... 5 2.1. Client Configuration ................................................................................................ 5 2.2. Server Settings ......................................................................................................... 6 2.3. System Settings ........................................................................................................ 8 2.4. Status Page ............................................................................................................. 10 2.5. Reboot .................................................................................................................... 11 2.6. Enter first time installation ..................................................................................... 11 2.7. Software download ................................................................................................ 12 3. LED information........................................................................................................ 14 4. Factory reset .............................................................................................................. 15 5. Trouble shooting ........................................................................................................ 16 6. Revision history ......................................................................................................... 16 1 www.alex-cs.info 1. First time installation 1 Install the Gladestone Gander program on your PC. 2 Connect Ethernet Cable to Alexander. 3 Connect Power to Alexander (See chapter LED information). 4 Wait until LED got 2.5Hz status. 5 Invoke Gladestone SW. 6 Select correct HOST address. (Your network IP, not your IP address). 7 Press “Seek” button and the program will scan for the connected Alexander. 2 www.alex-cs.info The result will look like this: Note: If several Alexander are connected on same NET then enable “All” checkbox, then program will scan complete NET .0 – 255. Select found IP address (check that MAC address is correct) and press the “Configure” button (Will be enabled when an item is selected). The program will now launch Internet Explorer with URL: http://192.168.1.233/ . If it doesn’t work then open your favorite WEB browser and use the URL as described above. If you don’t have a local network with DHCP, Alexander will get the static IP-address of 192.168.1.71 after at least 2 minutes. To start download server see chapter 2.7. 3 www.alex-cs.info If succeeded it will look like this: To get the system up and running you need to setup Server- and System Configuration. Then reboot the system and if the server is working the LED will stop flashing. 4 www.alex-cs.info 2. Configuration 2.1. Client Configuration Start configuration by selecting the “Client Configuration” page, it will look like this: Normally you don’t need to change anything here. DHCP: Remove this if you would like to set your own ip’s. Servers: should be 1 (Support for several servers is not implemented yet). Keep Alive: Interval between sending dummy bytes to server to prevent it from dropping the connection when STB or TV is off. Permitted values are 0-99. The function is disabled when the value is 0. Note! Frequent Keep Alive bytes increases the load on the server, do not enable unless you have to. Receive Timeout: Numbers of seconds to wait for server response on ECM’s and EMM’s. Should be less than 10, but never 0. Not available in Alexander ver 2. Enable EMM: EMM’s will be sent to server. 5 www.alex-cs.info User: Username for login to Alexander configuration interface, max 5 characters. Password: Password for login to Alexander configuration interface, max 5 characters. Disable crypto: Data to server will not be encrypted, used when connected to proxy-server. Extend SC timeout: Sends extended command bytes tp smartcard until codeword has received. Debug Rx/Tx: Used for debugging. Note! If you set the username and password for Alexander configuration interface you must remember these. If you forget them the only way to remove them is to do a factory reset. Press “Submit” to save configuration, “Back” to exit the configuration page. “Reset” will restore all values on the page, can only be used before you press Submit. 2.2. Server Settings Setup your server connection at this page 6 www.alex-cs.info Address: IP address to the server (URL works, max 31 characters). Port: IP port to the server. [1] Login: User name defined in server configuration file, max 19 characters. [2] Password: Defined in server configuration file, max 19 characters. [3] Key(hex): 14 byte key, will be used to decrypt IP communication must match key in server. [4] Press “Submit” to save configuration, “Back” to exit the configuration page. “Reset” will restore all values on the page, can only be used before you press Submit. References to configuration file newcs.xml. [1] <newcamd_port> section in <device> [2] <name> in section <user> [3] <password> in section <user> [4] <deskey> in section <newcamdserver> 7 www.alex-cs.info 2.3. System Settings Setup what kind of coding system that should be used. Type: Supported decryption systems are: Viaccess Boxer Conax Canal Digital, ComHem Videoguard “Not implemented yet” Videoguard-C Viasat (tunneled via Conax CI (Common Interface)) Atr: ATR string that Alexander send to Set-top box. Press “Submit” to save configuration, “Back” to exit the configuration page. “Reset” will restore all values on the page; can only be used before you press Submit. 8 www.alex-cs.info ATR’s: Viaccess 3F 67 00 00 C1 14 00 A2 68 90 00 Conax 3B 24 00 80 72 A4 45 3B 24 00 30 42 30 30 ( some boxes require this ATR ) Videoguard 3F 7F 13 25 03 40 B0 0B 69 4C 4A 50 C0 00 00 53 59 00 00 00 Videoguard-C 3B 24 00 80 72 A4 45 9 www.alex-cs.info 2.4. Status Page This page displays the current status; in this example the server connection has failed because no server has been configured. Server: Server connection status. Transmission: IP transmission status Client: Set-top box communication status. Error Log: This will display 16 latest problems. (Last error first in list), Cnt: Error index number. State: <state value> See “State Codes” at main page. Server: <error value> See “Error Codes” at main page. Transm: <error value> See “Error Codes” at main page. Error codes -200 -> -204 are related to serial communication between the set-top box (smartcard interface) and Alexander and are not documented on the web page. -200 Read byte error. -201 Read byte is outside limit. -202 Send byte acknowledge read error. -203 Send byte write error. -204 Send byte acknowledge mismatch. Debug: When enabled some more details will be added to log. 10 www.alex-cs.info Press “Refresh” to update the screen, “Back” to exit the status page. “Clear log” will clear all errors from the log. Note for Alexander ver 2: The list is limited to 16 entries. To get 16 new you have to clear the log. 2.5. Reboot This command is equivalent with powercycling Alexander. 2.6. Enter first time installation This will clear all settings for Alexander. It’s the same as Factory reset. 11 www.alex-cs.info 2.7. Software download This command will set Alexander in software download mode. The download server in Gladstone must be started before starting download in Alexander. You will find the latest softwares and tools at www.alex-cs.info. 12 www.alex-cs.info Pressing YES will set Alexander in software download mode. After reset the LED will be turned on and the bootloader will load new software from Gladstone. Make sure that the Download server is started. 13 www.alex-cs.info 3. LED information 5Hz (every 200ms) Initialization Phase: Module loads configuration parameters and retrieves an IP address via DHCP, if there is no DHCP server available it will timeout after 120 seconds and then using a static IP address (192.168.1.71). 2.5Hz (every 400ms). Connection phase: The module tries to connect the card sharing server and initialize selected decryption module. 1.67Hz (every 600ms). Error from server: Server has reported an error. Permanent Light Module is ready. LED Off – On For every ECM/EMM update the LED is turned off when sending message to server and LED is turned on when it receives result from server. If error occour then LED will flash every 600 ms. 14 www.alex-cs.info 4. Factory reset Connection between these 2 holes. Picture of Alexander ver 1. To remove all settings in Alexander, you have to make an electrical connection between the 2 holes showed in the picture. Then power up the unit for 10 seconds, then power down and remove the connection. Alexander will be in the state as it was from factory. Connection between these 2 holes. Picture of Alexander ver 2 15 www.alex-cs.info 5. Trouble shooting Description LED is constant on. The unit shows up when scanning with Gladstone, but unable to access it through the web interface. Cause Alex is in boot mode and is waiting for a new SW. Remedy Start the Download server in Gladstone, select a file and press Start. Power cycle Alex and the SW will start to download. Description LED is flashing with 2.5Hz and then off and then the cycle repeats. The unit is difficult to access through the web interface. Cause Alex can not connect to the server and is trying to get a connection by rebooting itself. Remedy Check that the server is online and that the network is working. Power cycle Alex. 6. Revision history Document version Alexander version Comment 1.0 0.94 First draft 1.1 0.998 Client Configuration updated and Factory reset added 1.2 1.008 Bootloader added 1.3 2.16 Alexander ver 2 1.5 2.16 Reviewed 1.6 2.16 FTI documentation error 16 www.alex-cs.info .
Recommended publications
  • Fausto Emulator Options
    Fausto Emulator Options CS cards Client supported: CCCam (TCP) Gbox (UDP) Newcamd (TCP) RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Gbox Listener (localhost only, default ports) Twin Protocol (Serial) CS Cards server supported: Newcamd (TCP) & EMM Support RadeGast (TCP) Camd35 (UDP cs357x) Camd35 (TCP cs378x) Camd33 (TCP) Support: - Ethernet (linux box, diablo wifi,...) - SSSP/HSIC/TM Share/CSC (Serial) - Season Interface (Cams/box Readers) - Diablo Wireless (base unit) Main Functions: - Emulator - Logger - Net client - Card server - Cards support - DVB Plugins (without pctv card) Monitor: Datas Showed: *Ch.Infos : Package name or extra infos *Ecm *Caid *Provider ID *Key Index *Key Value *Control Word decoded With Fausto internal emulator keys.bin file is required or Fausto will work like logger show Datas but decoded nothing. To load keys.bin clic on icon Folder or drag file Keys.bin on window. When ecm receive, FE (Fausto emulator) try to decode, if success Datas color will be repaint in blue in others case stay red For ECM not decoded : *keys.bin not loaded *caid/provider/valid key not on file (provider not managed or keys expired) Fixed CW Checked: use Direct Control Word from keys.bin Tracker checked: log all datas receive under tab Tracker Monitor checked: Show all datas under Emulator window Clear Datas: clean all datas showed under monitor & wait next incoming ecm for refresh Exit: Close emulator window For Local menu: Press Mouse right clic Options under local popup menu (mouse right clic) FeKid: Load
    [Show full text]
  • DVB-T (La "T" Sta Per "Terrestrial"-"Terrestre")
    Facoltà di Scienze Matematiche Fisiche e Naturali Anno Accademico 2008/2009 Tesina di Sicurezza su Reti 2 Prof. Alfredo De Santis Studente: Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo •Introduzione •I vantaggi dello standard digitale •Standard trasmissivi e Standard interattivi •Codifiche video •MPEG2 •Sicurezza nel sistema DVB •Il sistema per l’accesso condizionato (CAS) •Tecniche di scrambling •Cut and rotate •Line shuffle •Sicurezza e Gerarchia a livelli •Rimappatura •Il sistema Seca •La pirateria della televisione a pagamento •Le tecniche per la visione abusiva •I successi della pirateria •Proposte per combattere la pirateria. •Curiosità e info Università degli studi di Salerno Umberto Palo Il Digital Video Broadcasting (DVB) •rappresenta un insieme di standard aperti ed accettati a livello internazionale •concepiti per lo sviluppo e la diffusione della televisione digitale •ha prodotto degli standard per ciascun mezzo trasmissivo (terrestre, satellite, via cavo): •DVB-S (la "S" sta per "Satellite") •DVB-C (la "C" per "Cable"-"Cavo") •DVB-T (la "T" sta
    [Show full text]
  • CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 for CSCIP Applicant Use Only
    Module 6: Smart Card Usage Models – Mobile, NFC and Pay TV Smart Card Alliance Certified Smart Card Industry Professional Accreditation Program Smart Card Alliance © 2010 CSCIP Module 6 - Mobile-NFC-Pay TV Final - Version 2 - October 8, 2010 1 For CSCIP Applicant Use Only About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit http://www.smartcardalliance.org . Important note: The CSCIP training modules are only available to LEAP members who have applied and paid for CSCIP certification. The modules are for CSCIP applicants ONLY for use in preparing for the CSCIP exam. These documents may be downloaded and printed by the CSCIP applicant. Further reproduction or distribution of these modules in any form is forbidden. Copyright © 2010 Smart Card Alliance, Inc. All rights reserved. Reproduction or distribution of this publication in any form is forbidden without prior permission from the Smart Card Alliance. The Smart Card Alliance has used best efforts to ensure, but cannot guarantee, that the information described in this report is accurate as of the publication date. The Smart Card Alliance disclaims all warranties as to the accuracy, completeness or adequacy of information in this report.
    [Show full text]
  • Índice General
    AUTOR Javier Ferrer Aguilar DIRECTOR DE PROYECTO Carles Padró UPC Abril 2009 Índice general 1 Introducción.................................................................................................. 1 1.1 Contexto................................................................................................... 1 1.2 Propósitos y objetivos.............................................................................. 2 1.3 Limitaciones ............................................................................................ 3 1.4 Estructura de la memoria......................................................................... 4 2 Sistemas de Acceso Condicional (CAS)...................................................... 6 2.1 Arquitectura común de los CAS.............................................................. 7 2.1.1 Jerarquía de claves............................................................................................. 9 2.1.2 Distribución de claves ...................................................................................... 10 2.1.3 Interoperabilidad CA........................................................................................ 11 2.1.3.1 SimulCrypt.............................................................................................................. 11 2.1.3.2 MultiCrypt .............................................................................................................. 12 2.1.3.3 Comparación..........................................................................................................
    [Show full text]
  • Building a Launchpad for Impactful Satellite Cyber-Security Research
    SOK: Building a Launchpad for Impactful Satellite Cyber-Security Research James Pavur Ivan Martinovic Oxford University Oxford University [email protected] [email protected] Abstract—As the space industry approaches a period of rapid astrophysics. Academics in each domain have made valuable change, securing both emerging and legacy satellite missions will discoveries, but contributions in one field are easily overlooked become vital. However, space technology has been largely over- by researchers with a narrow focus on their own. looked by the systems security community. This systematization of knowledge paper seeks to understand why this is the case and This paper offers a cross-disciplinary synthesis of progress to offer a starting point for technical security researchers seeking to date on space systems security. The paper begins by impactful contributions beyond the Earth’s mesosphere. presenting a unified matrix of existing threat models - linking The paper begins with a cross-disciplinary synthesis of relevant attackers, vulnerabilities and motivations drawn from dozens threat models from a diverse array of fields, ranging from legal of prior studies. Underpinning this effort is an exhaustive and policy studies to aerospace engineering. This is presented as a “threat matrix toolbox” which security researchers may historical timeline of satellite hacking incidents, where our leverage to motivate technical research into given attack vectors own archival research is added to prior contributions from Fritz and defenses. We subsequently apply this model to an original and Manulis et al. [1], [2]. The combination of this historical chronology of more than 100 significant satellite hacking incidents analysis and threat modeling framework offers a useful aid spanning the previous 60 years.
    [Show full text]
  • DVB TELE-Satellite Receiver Guide
    € 7,80 ENG-CD The World’s Largest Satellite Magazine £ 4.95 04-05 TELE SATELLITE 2007 AU: AU$11.90 incl GST NG: Naira 500 B 9318 E EE: EEK 99,- ZA: R 44-95 INTERNATIONAL Country Company Report Company Report Report Dish Manufacturer Satellite Canada INFOSAT Wholesaler max communication Jiraporn Tangpiroontham Dirk Wittenborg President Managing Director Bangkok, Thailand Hamburg, Germany Company Report Receiver Manufacturer Fortec Star David McGrath General Manager Satellite Business in Winnipeg, Manitoba Toronto, Canada Company Report HDTV Broadcaster EURO1080 Yves Panneels Media Relations Manager Brussels, Belgium AF-8000HDCI Test Report HDTV CI Receiver with built-in scaler Exclusively for TELE-satellite Readers SatcoDX “World of Satellites” SatcoDX’s “World of Satellites” Software contains the technical data from every satellite transmission worldwide SatcoDX Software SatcoDX Software Activation Code Version 3.11: 5C4226C119615G77CGC8E43A54ED6GEA Activation Valid until the publication of the next issue of TELE-satellite magazine Code Download SatcoDX Software here: www.TELE-satellite.com/cd/0706/eng Step by Step Guide to Get SatcoDX Soft- the Internet and is allowed to access FTP. ware Running on Your Computer: Note: SatcoDX Software also runs without 1. Download SatcoDX Software Version 3.10 Activation Code, or with an outdated Activi- from the above URL, or install from CD-ROM ation Code. However, the satellite data on TELE SATELLITE INTERNATIONAL Note: if you have already installed Version Main Address: 3.10, you do not need to do it again. Check TELE-satellite International your currently PO Box 1234 installed ver- 85766 Munich-Ufg sion by click- GERMANY/EUROPA UNION ing the HELP Editor-in-Chief: button, then Alexander Wiese ABOUT.
    [Show full text]
  • Subverting Satellite Receivers for Botnet and Profit
    SUBVERTING SATELLITE RECEIVERS FOR BOTNET AND PROFIT Sofiane Mohamed Talmat [email protected] Abstract—New generation Set Top Boxes (STBs) are only by legitimate satellite receivers using official smart cards embedded Linux satellite TV receivers offering all the features of hold by the subscriber any Linux based machine, including wireless and network The encryption is provided by different CAS (Conditional connectivity, this allowed hackers to crack most satellite DVB- Access System) providers that are identified by a unique CA CA encryption schemes using card sharing and promoting the ID (table 1) however the main concept remains the same and apparition of a parallel black market for pay TV subscription at very low cost. is based on the encryption of the stream with a CW (Crypto word) that should be only decrypted by the related smart card This attack could be exploited to build a massive botnet of Linux with a valid subscription. based satellite receivers or even computers used for satellite decryption and accessing end users local area networks that will be used as an edge for any other kind of attacks. There are CA ID Company Developed by millions of unaware end users downloading and installing any 0x09XX Cisco NDS (CISCO) kind of plugins seeking cheap or even free satellite television, Videoguard then the attack could be difficult to mitigate, and could easily lead to a hacker controlling millions of devices on the internet. 0x17XX/0x18XX Nagravision Nagravision 0x06XX Irdeto Irdeto Index Terms—IoT, Card sharing, Satellite TV, attack, botnet. 0x0BXX Conax Conax AS 0x05XX Viaccess France Telecom INTRODUCTION 0x26XX Biss European During the last years, TV encryption scheme has evolved Broadcasting Union and adopted more complex cryptography designs and became Table 1: Some CAS providers almost impossible to crack using old techniques based on smart card cloning and emulation on open satellite receivers.
    [Show full text]
  • System Nagravision3 Key System Nagravision 3
    SYSTEM NAGRAVISION3 KEY SYSTEM NAGRAVISION 3 KEY PROJECTS FAQ ANNOUNCEMENTS JUNE 08, 2016, 16:00 JUNE 11, 2016, 11:10 JUNE 15, 2016, 01:48 June 09, 2016, 07:47 June 13, 2016, 01:07 June 17, 2016, 02:56 SYSTEM THOR VIACCESS MUSALMAN NAGRAVISION 3 NAGRA NAGRA 2 AURAT CHUDAI KEYPINK SPOTS UPCOMINGONEVENTS SCALPNECK PAIN + System nagravision 3 key JuneHEADACHE 18, 2016, 01:56 + Conditional access (abbreviated CA) or conditional access system (abbreviated CAS) is the protection of content by requiring certain criteria to be met before. MUTV Eutelsat BissRINGING 07/10/2016 Bulsatcom HellasEARS Sat Irdeto 05/10/2+ 016 AlmaSport TV Biss 25/09/2016 ESPN Caribbean & ESPN Syndication Biss Key 23/09/2016. Uydu Key ,Uydu Haber,UyduEYE Frekans,Uydu FLOATERS Şifreleri,Güncel Keyler,Güncel Turksat 1C Frekans Listesi ve Kanal Listesi,Hotbird Frekans Listesi Kanal Listesi. Sky wurde nun endlich geknackt. Zumindest titeln ettliche Internetforen im Moment ihre Beiträge, welche sich fast ausschliesslich mit dem neuen Sender Sky befassen. Przy okazji bieżących wymian kanałów między transponderami Cyfrowego Polsatu oraz nc+ także klienci usług pre-paid uzyskali kilka drobnych bonusów. Key 00 in DEC: 107 144 063 033 100 152 195 093 167 140 246 030 128 238 146 187 =====. System nagravision 3 key June 19, 2016, 00:49 Conditional access (abbreviated CA) or conditional access system (abbreviated CAS) is the protection of content by requiring certain criteria to be met before. Key 00 in DEC: 107 144 063 033 100 152 195 093 167 140 246 030 128 238 146 187 =====. Nagravision (or Nagra Kudelski or simply Nagra) is a company of the Kudelski Group that develops conditional access systems for digital cable and satellite television.
    [Show full text]
  • Analyzing the Modern OTT Piracy Video Ecosystem
    Analyzing the Modern OTT Piracy Video Ecosystem A Technical Paper Prepared for SCTE•ISBE by Don Jones Senior Manager Comcast Cable Communications Management, LLC 4100 East Dry Creek Rd, Centennial CO 80122 303-712-3588 [email protected] Kei Foo Senior Manager Charter Communications 8560 Upland Drive, Suite B, Englewood, CO 80112 720-518-2343 [email protected] © 2018 SCTE•ISBE and NCTA. All rights reserved. Table of Contents Title Page Number Table of Contents .......................................................................................................................................... 2 Introduction.................................................................................................................................................... 3 A Brief History of the Pirated-Content Ecosystem ........................................................................................ 3 The Financial Impact of Piracy ...................................................................................................................... 5 Business Models of the Pirate Offerings to Consumers ............................................................................... 6 Two Types of Content Delivery ..................................................................................................................... 7 Live Streaming Content Acquisition .............................................................................................................. 7 Live Streaming Content Distribution ............................................................................................................
    [Show full text]
  • Attacks on Pay-TV Access Control Systems
    Attacks on Pay-TV Access Control Systems Markus G. Kuhn Computer Laboratory Generations of Pay-TV Access Control Systems Analog Systems remove sync information, try to confuse gain-control in receiver, etc. cryptography is not essential part of decoding process still dominant type for most cable-TV premium channels Hybrid Systems broadcasted signal conforms to analog TV standard (PAL, D2MAC, NTSC, SECAM) analog signal scrambled with digital framebuffer using a cryptographically transmitted control word fully cryptographic subscription management using smartcards examples: VideoCrypt, EuroCrypt (EN 50094), Syster Nagravision Digital Systems broadcasted signal is digitally modulated, encrypted, and multiplexed MPEG-2 audio and video data stream cryptographic subscription management using smartcards as with hybrid systems examples: DVB, DSS/VideoGuard Example of a Hybrid System: VideoCrypt CPU1 CPU2 ADC SAT- FIFO-1 FIFO-2 Scrambler Smartcard receiver DAC TV OSD EPA 0428252 A2 Features: scrambling by active-line rotation, requires only memory for one single image line vertical-blank-interval data contains 32-byte messages with blacklist/whitelist data smartcard calculates 60-bit MAC as control word from 32-byte messages every 2.5 s CPU1 salts control word with frame counter to generate 60-bit PRNG seed per frame Scrambler uses 60-bit seed to generate cut-point sequence per frame An Image Processing Attack on VideoCrypt unscrambled source signal broadcasted scrambled signal result of cross-correlation with edge detector avoids horizontal final b/w descrambling result obtained cutpoints marked penalty zones around cut points without knowledge of card secret The VideoCrypt Smartcard Protocol Flow control ISO 7816 T=0 protocol: sent by decoder /smartcard CLA INS P1 P2 P3 INSDATA[1] .
    [Show full text]
  • SCCR/20/2 Rev E
    E SCCR/20/2 REV ORIGINAL: ENGLISH DATE : MAY 10, 2010 Standing Committee on Copyright and Related Rights Twentieth Session Geneva, June 21 to 24, 2010 Study on the Socioeconomic Dimension of the Unauthorized Use of Signals – Part II: Unauthorized Access To Broadcast Content – Cause And Effects: A Global Overview prepared by Screen Digest, London* * The views and opinions expressed in this Study are the sole responsibility of the author. The Study is not intended to reflect the views of the Member States or the Secretariat of WIPO. SCCR/20/2 Rev 2 TABLE OF CONTENTS TYPES OF UNAUTHORIZED ACCESS............................................................................... 5 PHYSICAL PIRACY ................................................................................................................ 5 HARDWARE BASED UNAUTHORIZED ACCESS .......................................................................... 5 UNAUTHORIZED RE-BROADCASTING OF SIGNALS.................................................................... 5 EXTRA-TERRITORIAL TV ACCESS (GREY MARKET).................................................................. 5 UNAUTHORIZED ACCESS – A REGIONAL VIEW ............................................................. 6 NORTH AMERICA ................................................................................................................. 6 LATIN AMERICA.................................................................................................................... 6 ASIA...................................................................................................................................
    [Show full text]
  • Wireless Smartwi with a Black Plastic Cover
    TEST REPORT Card Sharing Wireless SmartWi with a black plastic cover. Thanks to the new antenna, interference A close-up with the cover Pay TV reception removed shows the antenna: is now almost a thing of the past because no more radiation can the U-shaped conductor on enter the receiver. the right side which uses the all over the house whole length of the card in The outward appearance of the new version 8 Picture this: you have one pay TV subscription but several TV sets the control unit has remained spread all across the house. In the past there were three ways to dis- unchanged. On the inside, how- tribute pay TV to more then one TV: you either had to lay a dedicated ever, a lot has been amended. SmartWi box can be installed and cable to each TV set and this way set up your own private cable network, Firstly, the unit is now USB 2.0 configured in the usual Plug&Play or you had to use small radio transmitters which distribute the channel compatible, and secondly, the way, which makes it rather easy to all rooms, or you simply added any number of subscriptions to make transmission and reception to install the required driver and sure everybody in your family can watch the pay channel they want. capabilities have been vastly to open the programming tool. However, options 1 and 2 mean that the same channel has to be watched improved. Like for the previous by everyone in the house, and option 3 is only available for those willing model the power supply comes The software update only to spend money on several subscriptions month by month.
    [Show full text]