Attacks and Preventive Measures on Video Surveillance Systems: a Review

Total Page:16

File Type:pdf, Size:1020Kb

Attacks and Preventive Measures on Video Surveillance Systems: a Review applied sciences Review Attacks and Preventive Measures on Video Surveillance Systems: A Review Preethi Vennam 1 , Pramod T. C. 2, Thippeswamy B. M. 3, Yong-Guk Kim 4,* and Pavan Kumar B. N. 4,* 1 Department of Computer Science & Engineering, Dayananda Sagar University, Bengaluru 560078, India; [email protected] 2 Department of Computer Science & Engineering, Siddaganga Institute of Technology, Tumakuru 572103, India; [email protected] 3 Department of Computer Science & Engineering, Adama Science & Technology University, Adama 1888, Ethiopia; [email protected] 4 Department of Computer Engineering, Sejong University, Seoul 05000, Korea * Correspondence: [email protected] (Y.-G.K.); [email protected] (P.K.B.N.) Abstract: Video surveillance systems are widely deployed with large systems for use in strategic places such as home security, public transportation, banks, ATM centers, city centers, airports, and public roads, and play a vital role in protecting critical infrastructures. As various attacks are possible in these systems, identifying attacks and considering suitable security measures are essential. In this paper, we present a detailed review of existing and possible threats in video surveillance, CCTV, and IP-camera systems. This provides insight for the better identification of the security risks associated with the design and deployment of these systems and promotes further research in this emerging field. We also present countermeasures to prevent and protect the surveillance systems from various security attacks. Citation: Vennam, P.; T. C., P.; Keywords: video surveillance system (VSS); closed-circuit television cameras (CCTV); Internet of B. M., T.; Kim, Y.-G.; B. N., P.K. Things (IoT); security attacks Attacks and Preventive Measures on Video Surveillance Systems: A Review. Appl. Sci. 2021, 11, 5571. https://doi.org/10.3390/app11125571 1. Introduction Academic Editors: Juan Francisco De Surveillance systems have become more and more popular in recent times. Govern- Paz Santana and Gianluigi Ferrari ment and private organizations, residential societies, and commercial and public spaces, are using these systems to keep a check on various activities for security and safety pur- Received: 10 February 2021 poses. In French, the word “sur” means “from above” and “veiller” means “to watch”. Accepted: 10 June 2021 Surveillance means monitoring movements, activities and behavior in order to manage, Published: 16 June 2021 control, and protect people. Surveillance systems have the advantage of remote and contin- uous monitoring. To view events as they occur and to monitor activities in any area at a Publisher’s Note: MDPI stays neutral later time, closed-circuit television systems (CCTV) technology is being used. Increasing with regard to jurisdictional claims in thefts and criminal activities demand the usage of CCTV cameras in both commercial published maps and institutional affil- and residential sectors for security purposes. CCTV cameras are available in different iations. forms: non-IP (Internet Protocol), IP CCTV cameras and wireless CCTV cameras. Due to the features of technology, flexibility, ease of use, and affordability, the usage of IP-based wireless CCTV cameras is becoming a trend in the present scenario. As it is being used in many applications all over the world, the market for CCTV is widely expanding. Figure1 Copyright: © 2021 by the authors. shows the forecast of the wired and wireless cameras market in the coming years. The size Licensee MDPI, Basel, Switzerland. of the security camera market was valued at USD 3.71 billion in 2019 and is expected to This article is an open access article grow at a compound annual growth rate (CAGR) of 15.7% from 2020 to 2027 [1]. distributed under the terms and The virtue of IoT is that it gives new look for the upcoming video surveillance systems. conditions of the Creative Commons Instead of capturing footage and visualizing it later in order to detect theft, violence or Attribution (CC BY) license (https:// vandalism, there is a need for cameras to self-detect the abnormal events and interpret creativecommons.org/licenses/by/ the same to other systems for necessary actions. To cater to this, cameras are becoming 4.0/). Appl. Sci. 2021, 11, 5571. https://doi.org/10.3390/app11125571 https://www.mdpi.com/journal/applsci Appl. Sci. 2021, 11, x FOR PEER REVIEW 2 of 16 Appl. Sci. 2021, 11, 5571 2 of 17 smart, with the integration of the latest technologies. The smart cameras have exploited the benefits of computer vision, machine learning and automation. IoT helps to connect Appl. Sci. 2021, 11, x FOR PEER REVIEWnetwork-enabled cameras with other devices and systems and thus transforms secure2 of 16 surveillance into smart security surveillance systems. Figure 1. Security camera market size. The virtue of IoT is that it gives new look for the upcoming video surveillance systems. Instead of capturing footage and visualizing it later in order to detect theft, violence or vandalism, there is a need for cameras to self-detect the abnormal events and interpret the same to other systems for necessary actions. To cater to this, cameras are becoming smart, with the integration of the latest technologies. The smart cameras have exploited the benefits of computer vision, machine learning and automation. IoT helps to connect network-enabled cameras with other devices and systems and thus transforms FiguresecureFigure 1. 1.surveillanceSecurity Security camera camera into market marketsmart size. securitysize. surveillance systems. Overview of VSS: Video surveillance systems are widely used in cyber-systems such as healthcare,OverviewThe virtue oftraffic of VSS: IoT analysis, Video is that surveillance wildlifeit gives monew systemsnitoring, look are for environmenta widely the upcoming used inl monitoring, cyber-systems video surveillance weather such asforecastingsystems. healthcare, Instead and traffic public of analysis,capturing safety. wildlifeIn footage VSS, monitoring,security and visualizing cameras environmental areit later available in monitoring,order in a towide detect weatherrange theft, of forecastingstylesviolence and or features. andvandalism, public A wireless safety. there is InVSS a VSS,need source securityfor canodemeras cameras consists to self-detect areof cameras, available the aabnormal intransceiver, a wide events range storage and of stylesunit,interpret andmicroprocessor the features. same Ato wireless andother power systems VSS supply. source for necessa nodeEach consistsnodery actions. performs of cameras, To catervideo a transceiver,to compression, this, cameras storage data are unit,transmissionbecoming microprocessor smart, and withvideo and the capturing power integration supply. as the of basic the Each latest function. node technologies. performs The data video processingThe smart compression, camerasunit and data havedata transmissiontransmissionexploited the and unitbenefits video at each of capturing computer wireless as vision,node the basic pr machineocess function. a learninglarge The amount data and processing automation. of video unit data IoT and withouthelps data to transmissiondegradingconnect network-enabled information unit at each and wirelesscameras security, nodewith processwhichother devices is a largea mostand amount systemschallenging of videoand thustask data transformsin without video degradingsurveillancesecure surveillance information applications into and smart [2]. security, The security general which surveillance architecture is a most challenging systems. of a functional task in VSS video is illustrated surveillance in applications [2]. The general architecture of a functional VSS is illustrated in Figure2. FigureOverview 2. of VSS: Video surveillance systems are widely used in cyber-systems such as healthcare, traffic analysis, wildlife monitoring, environmental monitoring, weather forecasting and public safety. In VSS, security cameras are available in a wide range of styles and features. A wireless VSS source node consists of cameras, a transceiver, storage unit, microprocessor and power supply. Each node performs video compression, data transmission and video capturing as the basic function. The data processing unit and data transmission unit at each wireless node process a large amount of video data without degrading information and security, which is a most challenging task in video surveillance applications [2]. The general architecture of a functional VSS is illustrated in Figure 2. FigureFigure 2. 2.Overview Overview ofof videovideo surveillancesurveillance system. system. MotivationMotivation andand OurOur Contribution Contribution TheThe usageusage ofof VSSVSS isis ubiquitousubiquitous inin today’s today’s scenario. scenario. AsAs thesethese systemssystems areare moremore beneficialbeneficial andand availableavailable atat affordableaffordable cost,cost, theythey areare widelywidely utilizedutilized toto protect protect the the public public andand private private network network systems. systems. Attackers Attackers are are continuously continuously targeting targeting these these systems systems with newwith attacksnew attacks and vulnerabilities. and vulnerabilities. When weWhen use anwe internet-connected use an internet-connected camera from camera a computer from a or smartphone, there is a chance that someone else can access it. That person can be a computer or smartphone, there is a chance that someone else can access it. That person “hacker” or an application to which we may have
Recommended publications
  • Cisco Video Surveillance 8400 IP Camera Reference Guide Release 1.0.0
    Cisco Video Surveillance 8400 IP Camera Reference Guide Release 1.0.0 July 12, 2017 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cisco Video Surveillance 8620 IP Camera Data Sheet
    Data Sheet Cisco Video Surveillance 8620 IP Camera The Cisco® Video Surveillance 8620 IP Camera is an indoor, high-definition, full- functioning video endpoint with industry-leading image quality and processing power. The camera is capable of 1920 x 1080 resolution while optimizing network utilization with H.265, H.264, or Motion JPEG (MJPEG) compression. Contact closures allow integration with access control systems. With its open, standards-based design, the camera provides an ideal platform for integration and operation as an independent device or as part of a Cisco Video Surveillance network. The Cisco Video Surveillance 8620 IP Camera offer a variety of benefits, including: ● True High-Definition (HD) video: The camera streams crisp and clear video at resolutions up to 1920 x 1080 while maintaining low network bandwidth. ● P-Iris lens: The camera supports a P-Iris lens, which allows greater control of the lens aperture and produces a sharper image over typical DC iris lenses. ● True Wide Dynamic Range (WDR): 140 db dynamic range for scenes that contain both light and dark areas. ● Quad Streaming: The camera can stream H.265, H.264, and MJPEG video simultaneously. Each video stream can be configured with individual resolution, quality, and frame-rate settings. ● Day and night operation: The camera provides true day-night functionality and includes an infrared filter, which automatically switches to night mode in low-light scenes and can be set to manual, automatic, or scheduled control. ● Integrated infrared illuminator: The infrared illuminator with smart IR can light an area up to 50 meters away. ● Privacy regions: The camera supports up to five user-defined privacy regions.
    [Show full text]
  • AXIS P3367-V Network Camera 5-Megapixel, Light-Sensitive with Remote Focus and Zoom
    Datasheet AXIS P3367-V Network Camera 5-megapixel, light-sensitive with remote focus and zoom AXIS P3367-V is a fixed dome network camera that offers superb video performance in HDTV 1080p/5 MP resolution. It complies with the SMPTE 274M standard and can cover a large area with exceptional detail and light sensitivity. Wide dynamic range and day/night functionality provides high image quality even in low-light conditions. With multi-view streaming, the full view and up to 8 individually cropped out view areas can be streamed simultaneously. P-Iris control provides optimal depth of field, resolution, image contrast and clarity. Remote zoom and focus eliminate the need for hands-on fine tuning. AXIS P3367-V has support for digital pan/tilt/zoom, two-way audio, audio detection and input/output ports for external devices. > HDTV 1080p/5 MP > P-Iris control > Remote zoom and focus > I/O ports and two-way audio > IK10 vandal-resistance www.axis.com 17 220 AXIS P3367-V Network Camera Camera AXIS Digital Autotracking, AXIS Cross Line Detection 16/EN/M3.2/0 17 Support for AXIS Camera Application Platform enabling Image sensor Progressive scan RGB CMOS 1/3.2” 147 installation of third-party applications, see www.axis.com/acap Lens 3-9 mm, F1.2 Horizontal field of view: 84°–30° Event triggers Analytics, Edge storage events, External input Vertical field of view: 63°–22° Event actions File upload: FTP, SFTP, HTTP, HTTPS, network share and email Varifocal, Remote focus and zoom, P-Iris control, IR corrected Notification: email, HTTP, HTTPS and TCP
    [Show full text]
  • DVR Network Setup
    Network Setup We need to get the basic information needed to access the camera. After you have decided which router to connect the camera to, use a computer connected to the same router as the camera. (Windows) Go to the Start Menu and Search or Run “cmd”. If using Windows 8, press Windows + X and select “Command Prompt” Type in "ipconfig" and press enter. Write down the IP address, subnet mask, and default gateway. Our router subnet is “1” which is found as the third set of digits in the IP Address. Make a note of the subnet number. (Mac OS X) If using Mac OS X, go to System Preferences > Network > Advanced and note the IPv4 address, subnet mask, and router (gateway) address. Our router subnet is “1” which is found as the third set of digits in the IP Address. Windows (or its emulation) is required for some setup steps. If you purchased multiple cameras from us, it is best to add only one IP camera to the network at a time. Other IP cameras that are not yet configured should be added one at a time. To set up your camera for use on the network, connect the camera's wired network port to a router. Connect power to the camera, usually a 12VDC power source (if the camera is POE, you may use power over ethernet instead.) Check the network light on the camera's network jack to verify connection. At least one light should be on. If both lights are off, reseat the network cable on both ends.
    [Show full text]
  • OTO Handbook
    Office of Traffic Operations Intelligent Transportation System / Traffic Signal Section Handbook Version 7.4 July 2019 1 of 180 1st Quarter FY20 Table of Contents MATERIALS ...................................................................................................................................................................................... 4 SECTION 1300 - Closed Circuit TV (CCTV) CAMERAS .................................................................................................. 5 1300 Closed Circuit Television (CCTV) Cameras - Standard ..................................................................................... 6 ITEM 809E60000: CCTV IP-CAMERA SYSTEM, DOME -TYPE .............................................................................. 6 1301 Closed Circuit Television (CCTV) Cameras – Tunnel / Wall ......................................................................... 14 ITEM 809E60010: CCTV IP-CAMERA SYSTEM, TYPE HD, WALL/TUNNEL ................................................. 14 1304 Closed Circuit Television (CCTV) Cameras – ENHANCED ............................................................................. 16 ITEM 809E60030: CCTV IP-CAMERA SYSTEM, ENHANCED ............................................................................... 16 1305 Closed Circuit Television (CCTV) Cameras – QUAD MULTI-VIEW FIXED WITH PTZ ....................... 17 ITEM 809E60040: CCTV IP-CAMERA SYSTEM, QUAD MULTI-VIEW FIXED WITH PTZ ......................... 17 1390 Closed Circuit Television (CCTV) Cameras – Portable
    [Show full text]
  • AXIS M30 Network Camera Series Ultra-Discreet, Recessed-Mount Video Surveillance Solutions
    DATASHEET AXIS M30 Network Camera Series Ultra-discreet, recessed-mount video surveillance solutions. > Ultra-discreet fixed dome design > HDTV quality > Multiple H.264 streams > Easy installation > Power over Ethernet AXIS M3011 and AXIS M3014 Network Cameras, with their innovative and unique design, are specifically developed for recessed mounting in drop ceilings, offering unmatched, discreet video surveillance solutions that are ideal for retail stores, banks and other office buildings. With their ultra-discreet fixed dome design, AXIS M3011 AXIS M30 Network Cameras use progressive scan, pro- and AXIS M3014 measure only 9 cm (3.6”) wide and viding full resolution images of moving objects without protrude only 3 cm (1.2”) from the ceiling. To suit interior distortion, in 30 frames per second. AXIS M3011 provides design the cover ring is available in a range of colors. crisp and clear images in VGA resolution, whereas the AXIS M3014 delivers high-quality HDTV 720p or 1 AXIS M30 Network Cameras are innovatively designed for megapixel video, perfect for critical areas such as en- quick and easy installation in drop ceilings. Power over trances or checkouts that need to be monitored in greater Ethernet (IEEE 802.3af) supplies power to the cameras via detail. the network, eliminating the need for power cables and reducing installation costs. Multiple H.264 streams, as well as Motion JPEG streams, can be provided simultaneously either in full frame rate or individually optimized for different quality needs and bandwidth constraints. AXIS
    [Show full text]
  • IP Camera User Manual
    IP Camera user manual Product name:High definition IP Camera Document version:4.2 Editions suit for 1080P IP Camera Precautions Search and Login.............................................................................................................................1 Device searching............................................................................................................................2 Install plugin...................................................................................................................................3 A. Real-time previewing B. Remote setting 1. Camera configuration 1-1. OSD ( on screen display ) Setting 1-2. Image Setting 1-3. Video shade 2. Network configuration 2-1. Network setting 2-2. Wireless setting ( Note: Wired camera do not support this function) 2-3. Port setting 2-4. PPPoE Setting 2-5. E-mail Setting 2-6. FTP Setting 2-7. DDNS Setting 2-8. RTSP Setting 2-9. UPNP 2-10. P2P 3. Encoding configuration 3-1. Coding parameter 3-2. Audio Setting 3-3. Record Setting 4. Alarm setting 4-1. Motion detection 5. System Setting 5-1. Time setting 5-2. User management 5-3. Timed capture 5-4. Device information 5-5. Log query 5-6. PTZ Setting 5-7. Disk information 5-8. Automatic maintenance 5-9. Version upgrade 5-10. Reset D. Local settings E. Plack back 1. Local playback 2. Remote Playback Precautions After the IP camera is installed, you need to configure the functions and set the parameters. You can configure the related functions through the browser. Please refer to the actual product, the instructions are for reference only. The instructions and procedures will be updated in real time based on the product, and will be upgraded without further notice. The instructions may contain technically inaccurate areas or areas that do not correspond to the features and operation of the product.
    [Show full text]
  • How to Setup Wireless Function of Edimax IP Camera
    How to setup wireless function of Edimax IP Camera The wireless function of Edimax IP Camera is disabled by default. You need to hardwired the camera by Ethernet cable to connect the camera to your network first. Introduction For any new wi-fi devices (wireless computers, Edimax wireless camera, iPhone, Android) to join a Wi-Fi network, you need to know two things about your Wi-Fi network. 1. The SSID is the name of the wireless network. 2. The wireless encryption password of the wireless network. If you have no idea above the above two, you need to check your wireless router’s setting and find them out. Procedures Step 1. We recommend you assign a static IP address to IP camera, therefore, you’d better know the IP addresses used in your network. 1. Go to a computer which connects to your network as usual. Hardwired computer is preferred. 2. For Windows XP, click on Start, click on Run. Enter “cmd” hit OK. For Windows 7/Windows Vista, click on Start, go to “Search programs & files”, enter “cmd” hit OK. 3. In the command prompt window, enter “ipconfig” hit Enter. Locate the IP v4 address, subnet mask, and default gateway. 4. You can minimize the command prompt. The command prompt will be used later. In above example, the computer has IP 192.168.0.100 while the wireless router is 192.168.0.1. Step 2. Install the IP Camera software from CD disk. Step 3. We are going to change the IP address to Edimax camera to fit with our network.
    [Show full text]
  • IP Camera User Manual
    IP Camera User Manual For further help, please visit www.zmodo.com Preface Dear customer, thank you for choosing to purchase and use our IP camera products. This series of IP monitoring product is the integrated IP network camera which is researched for network video surveillance monitoring. The series includes network bullet camera, network IR bullet camera, and network dome camera, etc. High performance, monolithic SOC chip is utilized as media processor which integrates video capture, compress and transmission. Standard H.264 main profile encoding algorithm ensures more clear and smooth video transmission. Embedded web server allows user to view real-time footage and remote control via IE browser. This series of IP camera is well suited for home and small business, as well as any situation which needs to apply remote network transmission and remote network control. It's easy to install and operate. Declaration • The content in this manual may be different from the product version you are using. If you experience any issue that is not mentioned in this manual, please contact our tech-support or Zmodo Knowledge Base at kb.zmodo.com. • The content will be updated time to time. Our company reserves the right to update without notice. Target Reader This manual is primarily intended for the following users: • System planner • Onsite tech-support and maintenance personnel • Administrator for system installation • Users for business operation Terms in this manual IP Camera or IPC in this manual means network camera including network bullet camera, network dome camera, network PT camera, and network IR camera, etc. • Click: Refers to left-click with your mouse • Double click: Refers to left-double-click with your mouse • Right Click: Refers to right-click with your mouse • Square brackets "[ ]" indicates the window name, menu name and data sheet, such as [Download] ® Contents 1.
    [Show full text]
  • Simple, Affordable Video Surveillance for Small Businesses and Homes
    Solutions Brief Axis Communications* & Buffalo Americas* Intel® Digital Security Surveillance (DSS) Simple, Affordable Video Surveillance for Small Businesses and Homes Industry leaders Axis* Communications and Buffalo* Americas deliver a hassle-free, digital security and surveillance (DSS) solution—including Axis network cameras, Buffalo NAS storage, video management software, mobile viewing options and more—in an affordable, turnkey system based on Intel® technology. OVERVIEW DESIGNED FOR SIMPLICITY Advances in IP camera and network storage Axis and Buffalo are long-time industry technologies are allowing digital security and leaders in the video surveillance and network surveillance (DSS) solutions to deliver professional storage markets. Axis has the broadest and grade capabilities at price points that are friendly most consistent range of high-quality network to many small businesses (SMBs) and property cameras available today. Buffalo delivers owners. With powerful, versatile video cameras storage solutions specifically designed for SMBs. and terabytes of storage, today’s DSS solutions are Together, they have used their experience and ideal for capturing viewing, archiving and analyzing expertise to create a surveillance solution that all kinds of surveillance footage, offering more combines simplicity and performance: effective ways to safeguard people and property. Sized Right: To be successful in the SMB market, DSS The Axis/Buffalo solution is the right size solutions need to be simple to set up and easy for entry-level needs. Start small and easily to manage. Buffalo and Axis have achieved scale to 16 cameras and eight terabytes of this by using embedded API coding to create storage respectively. seamless integration between the camera and storage components.
    [Show full text]
  • User Manualmanual
    V1.0 UserUser ManualManual Model: FI9816P Indoor HD Pan/Tilt Wireless IP Camera with P2P (For Windows & Mac OS) Black White Table of Contents Security Warning...................................................................................................................................................................1 1 Overview............................................................................................................................................................................. 1 1.1 Key Features...........................................................................................................................................................2 1.2 Read Before Use....................................................................................................................................................2 1.3 Package Contents..................................................................................................................................................2 1.4 Physical Description.............................................................................................................................................. 3 1.5 SD Card................................................................................................................................................................... 4 2 Access the IP Camera...................................................................................................................................................... 5 2.1 Hardware Connection
    [Show full text]
  • IP Camera Tester
    IP7TM2 7” IP, TVI, CVI, AHD & 960H Service Monitor USER GUIDE 2995 Foothills Blvd. Ste 200, Roseville, CA 95747 ♦ 855-388-7422 ♦ www.northernvideo.com Rev. 091021 Thank you for purchasing the IP camera tester. Please read this manual before using the IP camera tester to insure proper use. For Safety purposes please read the Safety Information section in the manual carefully. The manual should be retained and available for reference. The included Micro-SD Card contains files needed for re-installing Apps. Please save these files for easy reinstallation of any Apps removed from the tester. If there are any questions or problems while using the IP camera tester please call 855-388-7422 or email [email protected] for support. Contents 1 .Safety information ------------------------------------------------------------------------------------------------ 1 2. IP Camera Tester Introduction --------------------------------------------------------------------------------- 2 2.1 General ---------------------------------------------------------------------------------------------------------- 2 2.4 Packing list ----------------------------------------------------------------------------------------------------- 2 2.5 Function interface --------------------------------------------------------------------------------------------- 3 3. Operation ----------------------------------------------------------------------------------------------------------- 6 3.1 Installing the Battery------------------------------------------------------------------------------------------
    [Show full text]