DP-8000 SIM8302-SIK-8000-Ins Revd

Total Page:16

File Type:pdf, Size:1020Kb

DP-8000 SIM8302-SIK-8000-Ins Revd INSTALLATION MANUAL SI/SIM/SIK/ DP-8000 IP Intercom System ELITE SIM/SIK/SI- 8000Series IP Intercom System QUICK START GUIDE CONTENTS Introduction Specifications and Package Contents 1 Dimensions 2 Installation and Connections 3 System Diagram 5 Basic Functions and Operation 6 Factory Reset 7 I. Detect and Verify Network Settings Search for devices with CVT Upgrade Tool 8 Getting to a Command Prompt in Windows Verify your computer’s network settings 9 Compare your computer’s IP address with your SIM’s IP address II. Accessing and Configuring the Setup Interface Launching the user interface 10 Enter log in credentials LAN Settings 11 Device Settings 12 Access Settings 13 SIP Settings 14 Forward Account Settings 15 External Module Settings 17 Advanced Settings Phone Book 18 Default, Restore and Backup Log Out 19 Support and Warranty (Back) SI/SIM/SIK/DP-8000Series IP Intercom System SPECIFICATIONS PACKAGE CONTENTS CPU 350 MHz Model: SIM-8302 RAM DDR2 (1 GB x 2) Flash 2 GB Power 12V DC IP Rating IP 66 Rated Power 6W Standby Power Consumption 6W Operating Temperature -5ºF ~ 131ºF Relative Humidity 20% ~ 93% Screen 3.5” Dot Matrix AllenW rench SealRing Dimensions H 14.75” W 6.5” D 2” Model SIK-8000 series Waterproof jacket1 Waterproof jacket2 Waterproof jacket3 Cover Installation screws Network port seal ring 1 6.5” Camera Speaker LEDs Display 14.75” 13.75” Digital Keypad Microphone Card Reader 2”depth 5.5” Flush Mount Box Dimensions 2 INSTALLATION Back Panel Power Input / Digital Lock Signal +12 V +12 V GND LOCK GND YELLOW BLACK 1 2 VDC S IM-8302 RED P ower Supply Rear Panel How to Connect: Ÿ SIM-8302 Power Output connects with 12V DC Power Supply and Power Input (P) in SIM-1DS. Dip Switches Ÿ SIM-8302 Ground Output connects (setup activation time) with Ground of Power Supply and Ground Input (G) in SIM-1DS input. Ÿ Digital Lock Input SIM-8302 Lock Signal Output Signal, Ground, & Power (Yellow) connected to Signal Input (S) in Module SIM-1DS. S G P 110 Connectors Programming Chart Connections are parallel (8-200 seconds) (there is no “In” or “Out”) LED Indicator Relay Contacts Flashes momentarily when NO/NC - 12V AC or DC activation signal is received SIM-1DS (Rear View) 3 Exit/Door Detector Exit/Door Door Detector Detector Switch RS485 RJ45 Pin Out: T-568B Enable to connect equipment with RS485 interface. RS485 interface enables to output 12V/100mA power. +12V is not needed to wire if it is unused. RS485 Interface RS485 Equipment 4 securing screw SIK-8000 series Securing screws Custom name/address 4” ” lHole 2.36” Waterproof 7.125 Plug CAT5 Cable Network switch CAT5e Exit button BUT1 BUT2 - - EX EX +12V GND COM +12V Strike/Lock GND _ + DC DC strike power supply 5 DP-8000 Series Intercom Doorstation Accessory pack and cable management Cable cover Waterproof jacket 1 Waterproof jacket 2 Screw wrench Waterproof jacket 3 Installation screws Schematic 1: Connect with electric lock Schematic 2 Using the same power supply for the Intercom and strike/lock, Wiring a normally closed strike/lock with a separate power supply DP-8000 SI-8000 series 485- 485+ 485- GND 485+ V+ GND V+ CAT-5e CAT-5e LOCK+ LOCK GND +12V +12V GND +12V 1.+12V COM NC GND NO 2.GND Power(DC12V) DC Strike/Lock Power Lock Supply power provided by intercom System Diagram Common connect 12V+ to Common +12Vdc 485- 485+ GND V+ SIK-8000 series + CAT-5e normally +12V GND open Connect with magnetic lock: 1.+12V 2.GND Ground Power(DC12V) Strike/Lock power provided by intercom Power on Ethernet: Compatible with IEEE 802.3af, 48V PoE standard. 485- 485+ GND V+ CAT-5e LOCK LOCK+ Power(DC12V) GND +12V +12V GND CTRL LOCK GND CAT-5e Power(DC12V)(optional) GND +12V Magnetic lock +12V PoE Switch ST-C5IDS relay pcb COM NC GND NO DC Power Lock Supply 6 Basic Operation Basic Functions Calling Indoor Monitor • Video intercom with indoor • Input floor and room number (at least 3 digits), monitor & management center then press # to confirm. If you do not press pound • ID card reader - the unit will automatically call after 2 seconds. Supports a maximum of 10,000 cards • You can also make a call by searching through • Access password unlocking the phone book. To search the phone book, • Supports standard SIP protocol press the up or down arrow on the keypad, to communicate with IP phones then press # once you have found the person and SIP software you wish to call • Phone book search and direct dial • If the indoor monitor you are trying to reach is unavailable, the outdoor panel will display “Busy”, then auto return to standby mode. ✱ • Press the button to end communication at any time during the call Calling Management Center Unlocking the Door • Dial “0000” then press # to call 1. Unlocking by Access Password the management center • Press the # key, enter the access password • If the management center is busy or unavailable, (default is 000), then press the # key the outdoor panel will display “Busy”, to confirm then auto return to standby mode. • Press the ✱ button to end communication 2. Unlocking by IC/ID card at any time during the call. • Hold the IC/ID card up against the card reader area of the SIM Intercom Front Display Instruction Call Guard / Management Center: 0000 + # Call a room directly Call: RoomNo + # (e.g. 1111#) Unlock: # + PSW + # Unlock door from keypad (e.g. #123456#) Search Directory Name: ▲ or ▼ 7 Reset SIM unit to Factory Default Settings 1. Press # key twice and type in the default password: 123456. This will take you to menu settings 2. Select the Default menu, then enter into the Default Settings menu 3. Press 1 to indicate that all settings will be back to Factory Default Settings, press # to confirm Access Control Card Reader Section There are two ways to delete the card information: 1. If you registered the card via Management Software, you can delete the card information in the software as well 2. If you registered the card via SIM panel, you can reset the SIM to Factory Default Settings to delete the card information 8 1 Detect Door Station & Verify Network Settings 1-1 Connect a 12V DC power supply to your SIM/MDU, then connect your SIM/MDU to your switch or router via CAT5e or CAT6, then launch the CVT Upgrade Tool. Click on Search to find the IP address of your SIM/MDU intercom. By default, the address is 192.168.1.200. Device ID IP address MAC address 1-2 Verify your computer’s LAN settings via Command Prompt The easiest way to open Command Prompt on a Windows machine is to press Win+R on your keyboard. Hold the Windows key down and then press R. In the Run window, type “cmd” then hit OK. This will open Command Prompt 9 1 Detect Door Station & Verify Network Settings 1-3 In the Command Prompt window, type in “ipconfig” and press enter to find your computer’s IP address, subnet mask, and default gateway (your router’s IP address). Make sure to take note of your IP address, your network mask and default gateway so you can reference them later. 1-4 Compare your computer’s IP address with the IP address of the SIM/MDU Intercom. If the first three sets of numbers (192.168.1.x) from your computer’s IP address match the SIM/MDU Intercom’s first three sets of numbers (192.168.1.x), you can proceed to Step 2. If they don’t match, you can refer to the “changing Device ID IP address MAC address network settings” portion of this manual. 10 2 Forward SIP calls 2-1 Open Internet Explorer and type the IP address of your SIM/MDU Intercom into the address bar and hit enter. 2-2 A log-in window will appear and you will enter your user name and password to access the user interface. The default credentials are “admin”, and “123456”. Note: Do not proceed to Step 3 until you have verified your computer and SIM Intercom are on the same network Default IP addresses: SIM-8302 Multi-tenant station 192.168.1.200 SIK-8000 Intercom w/keypad 192.168.1.240 DP-8000 IP Intercom series 192.168.1.203 ST-3078 7” touchscreen 192.168.1.230 ST-3108 10” touchscreen 192.168.1.220 11 2 Forward SIP calls 2-3 LAN Settings IP: It must be a unique IP address with the first three sets of numbers (192.168.1.x) matching the first three sets of numbers of your Gateway address. The last set (x) can be any number between 2 and 253. Each SIM/MDU Intercom ships with a default IP address of 192.168.1.200 or based on the models on previous page. Mask: The default mask is 255.255.255.0. Most simple networks that don’t require more than 254 usable IP addresses will use this mask by default. If more addresses are required then you will most likely have a network engineer working on the project who will take care of the subnetting. Gateway: The gateway is the IP address of your router, think of it as your devices gateway to get out of the local area network (LAN). It tells your devices where to send information if it needs to go to another network or the internet. DNS: You need to match your DNS address to the DNS address you’ll get when you type “ipconfig /all” into the command prompt.
Recommended publications
  • Course 5 Lesson 2
    This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author (s) and do not necessarily reflect the views of the National Science Foundation C5L3S1 With the advent of the Internet, social networking, and open communication, a vast amount of information is readily available on the Internet for anyone to access. Despite this trend, computer users need to ensure private or personal communications remain confidential and are viewed only by the intended party. Private information such as a social security numbers, school transcripts, medical histories, tax records, banking, and legal documents should be secure when transmitted online or stored locally. One way to keep data confidential is to encrypt it. Militaries,U the governments, industries, and any organization having a desire to maintain privacy have used encryption techniques to secure information. Encryption helps to boost confidence in the security of online commerce and is necessary for secure transactions. In this lesson, you will review encryption and examine several tools used to encrypt data. You will also learn to encrypt and decrypt data. Anyone who desires to administer computer networks and work with private data must have some familiarity with basic encryption protocols and techniques. C5L3S2 You should know what will be expected of you when you complete this lesson. These expectations are presented as objectives. Objectives are short statements of expectations that tell you what you must be able to do, perform, learn, or adjust after reviewing the lesson.
    [Show full text]
  • MASTERCLASS GNUPG MASTERCLASS You Wouldn’T Want Other People Opening Your Letters and BEN EVERARD Your Data Is No Different
    MASTERCLASS GNUPG MASTERCLASS You wouldn’t want other people opening your letters and BEN EVERARD your data is no different. Encrypt it today! SECURE EMAIL WITH GNUPG AND ENIGMAIL Send encrypted emails from your favourite email client. our typical email is about as secure as a The first thing that you need to do is create a key to JOHN LANE postcard, which is good news if you’re a represent your identity in the OpenPGP world. You’d Ygovernment agency. But you wouldn’t use a typically create one key per identity that you have. postcard for most things sent in the post; you’d use a Most people would have one identity, being sealed envelope. Email is no different; you just need themselves as a person. However, some may find an envelope – and it’s called “Encryption”. having separate personal and professional identities Since the early 1990s, the main way to encrypt useful. It’s a personal choice, but starting with a single email has been PGP, which stands for “Pretty Good key will help while you’re learning. Privacy”. It’s a protocol for the secure encryption of Launch Seahorse and click on the large plus-sign email that has since evolved into an open standard icon that’s just below the menu. Select ‘PGP Key’ and called OpenPGP. work your way through the screens that follow to supply your name and email address and then My lovely horse generate the key. The GNU Privacy Guard (GnuPG), is a free, GPL-licensed You can, optionally, use the Advanced Key Options implementation of the OpenPGP standard (there are to add a comment that can help others identify your other implementations, both free and commercial – key and to select the cipher, its strength and set when the PGP name now refers to a commercial product the key should expire.
    [Show full text]
  • Copyrighted Material
    33_754935 bindex.qxp 11/7/05 10:09 PM Page 345 Index Applications Menu, 42–43, 68–71 • Symbols • Applixware Office package, 15 appointments, tracking, 210 * (asterisk), 249, 251 archives, packing and unpacking (tar), 20, \ (backslash), 248 337–338 - (dash), 94 arguments, command line, 247 . (dot), 92 asterisk (*), 249, 251 ! (exclamation point), 252–253 Asymmetric DSL (ADSL), 108–109 / (forward slash), 79, 81 attachments, e-mail, 154 > (greater-than sign), 249 audio CDs, playing, 221–223 - (hyphen), 95 authentication, 292 < (less-than sign), 249 automatic command completion, 250 . (period), 96 automatic login, 40, 318–319, 325 | (pipe), 248 ? (question mark), 251 " (quotation marks), 247 ; (semicolon), 248 • B • [] (square brackets), 252 backdoor, 292 .. (two dots or dot-dot), 92 background, desktop, 73–74, 75–76 backing up files, 20 backslash (\), 248 • A • base station, 129 bash (Bourne Again Shell) access point, wireless LAN, 129, 131 automatic command completion, 250 Adobe Portable Document Format. See PDF combining commands, 248 ADSL (Asymmetric DSL), 108–109 described, 47–48, 246 AES (Advanced Encryption Standard), 129 error messages, saving to file, 249–250 aggregator, RSS, 185 file, command input from, 249 AIM (America Online instant messaging output, saving to file, 249 service), 54, 161–162 repeating previously typed commands, Akregator news reader, 54, 185–186 252–253 amaroK music player, 224 syntax, 247–248 Apache Web server, 16 wildcards, 251–252 applets, 68, 75 bastion host, 293 application gateway, 292 bit bucket, 250 applications Blam RSS reader, 54 controlling, 18–19 block device, 94 development, 17 Bluetooth wireless, 20, 271 e-mail, 152–153 bookmark field, 200 GNOME Desktop, illustrated,COPYRIGHTED 64 boot menu MATERIAL items, installing, 27–28 GNU, 343 boot process, starting and stopping services, installing at setup, 32 263–264 KDE Desktop, illustrated, 64 booting, 26–27, 39–40 Linux packages, 11 Bourne Again Shell.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • ULTIMA X Series 3 EC Declaration of Conformity MSA
    Operating Manual ULTIMAX-Series Gas Monitors Order No. 10046690/09 MSA AUER GmbH Thiemannstrasse 1 D-12059 Berlin Germany © MSA AUER GmbH. All rights reserved MSA EC Declaration of Conformity EC Declaration of Conformity Manufactured by: Mine Safety Appliances Company 1000 Cranberry Woods Drive Cranberry Township, PA 16066 USA The manufacturer or the European Authorized Representative: MSA AUER GmbH, Thiemannstrasse 1, D-12059 Berlin declares that the ULTIMA XE Main product ULTIMA XE Main with HART Module based on the EC-Type Examination Certificate: DMT 02 ATEX E 202 X complies with the ATEX directive 94/9/EC, Annex III. Quality Assurance Notification complying with Annex IV of the ATEX Directive 94/9/EC has been issued by Ineris of France, Notified Body number: 0080. The product is in conformance with the EMC directive 2004 / 108/ EC, EN 50270 :2006 Type 2 *, EN 61000 - 6 - 4 : 2007 * EN 61000-4-6 : Ultima XE MAIN HART MODULE : occasional transmission error can appear at the 2-wire version. A fault check has to be used at the receiver unit. The product complies with the directive 96/98 / EC (MarED), based on the EC-Type Examination Certificate : SEE BG 213.038 The quality survaillance is under the control of SEE BG, Notified Body number: 0736 We further declare that the product complies with the provisions of LVD Directive 2006 / 95/ EC, with the following harmonised standard: EN 61010-1 :2002 MSA AUER GmbH Berlin, October 2008 Dr. Axel Schubert R&D Instruments ® GB ULTIMA X Series 3 EC Declaration of Conformity MSA EC Declaration of Conformity Manufactured by: Mine Safety Appliances Company 1000 Cranberry Woods Drive Cranberry Township, PA 16066 USA The manufacturer or the European Authorized Representative: MSA AUER GmbH, Thiemannstrasse 1, D-12059 Berlin declares that the product ULTIMA SENSOR XE based on the EC-Type Examination Certificate: DMT 02 ATEX E 202 X complies with the ATEX directive 94/9/EC, Annex III.
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
    Institute of Operating Systems and Computer Networks Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars Wolf, 2017-07-18 wiretapping difficulty End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time
    [Show full text]
  • CS 255: Intro to Cryptography 1 Introduction 2 End-To-End
    Programming Assignment 2 Winter 2021 CS 255: Intro to Cryptography Prof. Dan Boneh Due Monday, March 1st, 11:59pm 1 Introduction In this assignment, you are tasked with implementing a secure and efficient end-to-end encrypted chat client using the Double Ratchet Algorithm, a popular session setup protocol that powers real- world chat systems such as Signal and WhatsApp. As an additional challenge, assume you live in a country with government surveillance. Thereby, all messages sent are required to include the session key encrypted with a fixed public key issued by the government. In your implementation, you will make use of various cryptographic primitives we have discussed in class—notably, key exchange, public key encryption, digital signatures, and authenticated encryption. Because it is ill-advised to implement your own primitives in cryptography, you should use an established library: in this case, the Stanford Javascript Crypto Library (SJCL). We will provide starter code that contains a basic template, which you will be able to fill in to satisfy the functionality and security properties described below. 2 End-to-end Encrypted Chat Client 2.1 Implementation Details Your chat client will use the Double Ratchet Algorithm to provide end-to-end encrypted commu- nications with other clients. To evaluate your messaging client, we will check that two or more instances of your implementation it can communicate with each other properly. We feel that it is best to understand the Double Ratchet Algorithm straight from the source, so we ask that you read Sections 1, 2, and 3 of Signal’s published specification here: https://signal.
    [Show full text]
  • FALL 2020 E-NEWSLETTER at Digital Mountain We Assist Our Clients with Their Computer Forensics, E-Discovery, Cybersecurity and Data Analytics Needs
    FALL 2020 E-NEWSLETTER At Digital Mountain we assist our clients with their computer forensics, e-discovery, cybersecurity and data analytics needs. For this E-Newsletter, we focus on ephemeral communications and the affect of disappearing messages on discovery cases. Ephemeral Applications: Digital Trick or Treat The trick in trick or treating is one that has evolved from the neighbor who dons a monster mask when opening the door to the disappearance of peanut butter cups when Dad does the safety check of the night’s candy haul. Our digital communications have gone through an analogous transformation as we first marveled at how much data our devices could hold. Just as we upgraded from a small plastic pumpkin to a pillowcase for larger candy collections - we saved a growing plethora of emails, text messages, digital images, voice messages, and all manner of documents on mobile devices. Now, with the rise of discovery, we want our vulnerable data to disappear as if it were our least favorite candy. Ephemeral applications may be just the trick for that unwanted data. Call It What You Will There is no consensus about what constitutes an ephemeral application beyond the understanding that there is an element of impermanence. In 2016, three Georgia Tech College of Computing researchers proposed the creation of “ephemeral apps” that would allow users to engage with apps on a trial basis that would “pop-up instantaneously” on devices and then disappear after a certain period (https://www.cc.gatech.edu/~kbhardwa/papers/eapps.pdf). At the opposite end of the spectrum, in 2017 fan favorite Snapchat modified its app to allow recipients to determine when photographs and video would disappear rather than the burn after reading settings that propelled Snapchat’s rapid rise (https://www.vox.com/2017/5/9/15595040/snapchat-product-update-limitless-q1-earnings).
    [Show full text]
  • Policy Options and Regulatory Mechanisms for Managing Radicalization on the Internet
    Policy options and regulatory mechanisms for managing radicalization on the Internet Paris, 30 September 2016 “[…] I firmly believe that in a free democratic society, freedom of speech and expression is one of the most prized freedoms which must be defended and upheld at any cost and this should be particularly so in the land of Voltaire. It is indeed unfortunate that in the world of today, when science and technology have advanced the frontiers of knowledge and mankind is beginning to realize that human happiness can be realized only through inter-dependence and cooperation, the threshold of tolerance should be going down. It is high time man should realize his spiritual dimension and replace bitterness and hatred by love and compassion, tolerance and forgiveness.” Justice Prafullachandra Bhagwati Dan Shefet (Individual Specialist) ACKNOWLEDGEMENTS The author wishes to thank the following for their support, valuable advice and input throughout the drafting of the Report: Dr. Indrajit Banerjee and his team in UNESCO’s Knowledge Societies Division The UNESCO Delegates and Ministries of Justice/Interior of countries that have participated in the Country Survey. Alexander Linden, Honorary advisor to the French Supreme Court Janice Duffy, Researcher, Australia Pavan Duggal, Supreme Court Lawyer, India Tom Høyem, Former Minister in Denmark under Poul Schlüter Francesca Musiani, Researcher at the CNRS Institute for Communication Sciences and Member of the French National Assembly’s Commission on the Law and Rights in the Digital Era Sami Mahbouli, Lawyer at The Tunisian Supreme Court and Columnist Sabine Leutheusser-Schnarrenberger, Former Minister of Justice under Angela Merkel Marc Randazza, First Amendment Attorney, United States Viswa Sadasivan, CEO of Strategic Moves (Consultancy agency in Singapore) and former member of the Singaporean Parliament Mr K.
    [Show full text]
  • Pgpfone Pretty Good Privacy Phone Owner’S Manual Version 1.0 Beta 7 -- 8 July 1996
    Phil’s Pretty Good Software Presents... PGPfone Pretty Good Privacy Phone Owner’s Manual Version 1.0 beta 7 -- 8 July 1996 Philip R. Zimmermann PGPfone Owner’s Manual PGPfone Owner’s Manual is written by Philip R. Zimmermann, and is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Pretty Good Privacy™, PGP®, Pretty Good Privacy Phone™, and PGPfone™ are all trademarks of Pretty Good Privacy Inc. Export of this software may be restricted by the U.S. government. PGPfone software is (c) Copyright 1995-1996 Pretty Good Privacy Inc. All rights reserved. Phil’s Pretty Good engineering team: PGPfone for the Apple Macintosh and Windows written mainly by Will Price. Phil Zimmermann: Overall application design, cryptographic and key management protocols, call setup negotiation, and, of course, the manual. Will Price: Overall application design. He persuaded the rest of the team to abandon the original DOS command-line approach and designed a multithreaded event-driven GUI architecture. Also greatly improved call setup protocols. Chris Hall: Did early work on call setup protocols and cryptographic and key management protocols, and did the first port to Windows. Colin Plumb: Cryptographic and key management protocols, call setup negotiation, and the fast multiprecision integer math package. Jeff Sorensen: Speech compression. Will Kinney: Optimization of GSM speech compression code. Kelly MacInnis: Early debugging of the Win95 version. Patrick Juola: Computational linguistic research for biometric word list. -2- PGPfone Owner’s
    [Show full text]
  • Toxic Potency Measurement for Fire Hazard Analysis
    United States Department of Commerce National Institute of Standards and Technology NIST Special Publication 827 Toxic Potency Measurement for Fire Hazard Analysis Vytenis Babrauskas, Barbara C. Levin, Richard G. Gann, Maya Paabo, Richard H. Harris, Jr., Richard D. Peacock, and Shyuitsu Yusa NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY Research Information Center Gaithersburg, MD 20899 DATE DUE Demco, Inc. 38-293 MP NIST Special Publication 827 m Toxic Potency Measurement for Fire Hazard Analysis Vytenis Babrauskas, Barbara C. Levin, Richard G. Gann, Maya Paabo, Richard H. Harris, Jr., Richard D. Peacock, and Shyuitsu Yusa Building and Fire Research Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 December 1991 U.S. Department of Commerce Robert A. Mosbacher, Secretary National Institute of Standards and Technology John W. Lyons, Director National Institute of Standards U.S. Government Printing Office For sale by the Superintendent and Technology Washington: 1991 of Documents Special Publication 827 U.S. Government Printing Office Natl. Inst. Stand. Technol. Washington, DC 20402 Spec. Publ. 827 119 pages (Dec. 1991) CODEN: NSPUE2 Table of Contents Page List of Figures v List of Tables vi Executive Summary vii Abstract 1 1 Introduction 1 2 Computations of fire hazard 4 2.1 Quantifying hazard in fires 4 2.1.1 Hand calculations 4 2.1.2 Computer models 5 2.2 Definitions of terms 6 2.3 Fire scenarios and toxic potency data 6 3 Types of fires 9 4 Toxic potency measurements 13 5 Criteria for bench-scale toxic
    [Show full text]
  • Internet Telephony with Linphone WELLWELL CONNECTEDCONNECTED
    Linphone COVER STORY Internet telephony with Linphone WELLWELL CONNECTEDCONNECTED When you want to call your friends in distant countries, don’t pick up municate with the VoIP provider, so you will need to install the library first. To do the phone; just put on your headset and fire up Linphone. so, open a terminal window, then be- come root by typing su and supplying BY SIMONE SCHÄFER the root password. Unpack the archive by typing tar xzf libosip2-2.2.0.tar.gz, ne of the most popular methods wants to take incoming calls via Purtel. and then change to the new directory (cd for accessing Voice over IP tech- The procedures are similar for other pro- libosip2-2.2.0). The following commands Onology is through a so-called viders. will build and install the library: softphone. A softphone is simply a com- puter program running on your desktop Installation ./configure --prefix=/usr that handles call establishment and com- The source code for the 1.1.0 release, make munication. Linphone [1] is one of the and the libraries, are available on the most popular softphone applications for DVD with this issue below LinuxUser/ Phone Numbers and SIP Ids Linux. Linphone is optimized for the linphone/. In the simplest of all cases, the phone Gnome desktop, although that doesn’t Mandriva Linux 2006 has the current number will be a simple telephone num- mean you can’t run it on KDE. This arti- 1.1.0 version. Gentoo Linux users can ber followed by the SIP domain, such as cles describes how to install, configure, install Linphone 1.1.0 simply by running [email protected].
    [Show full text]