Features Security Lessons: Secure Video

Total Page:16

File Type:pdf, Size:1020Kb

Features Security Lessons: Secure Video FEATURES Security Lessons: Secure Video Secure Video Surveillance Camera Shy Unless your surveillance cameras are wired directly to a video board, they are notoriously insecure. We show you how to keep your cameras from being compromised. By Kurt Seifried n issue 121, Marcel Gagné covered buy a portable WiFi jammer for US$ 40 Non-IP-based cameras with a direct line the basics of building a video sur- from a site like DealExtreme. And, al- to the surveillance system mean that at- veillance system using Linux and though these devices often are illegal tackers will have to compromise the sur- I Kmotion [1]. But, to build a really (because they interfere with wireless veillance server directly to get at the secure, scalable (with dozens or hun- networks, oddly enough), I’ve never video information. Also, most video sur- dreds of cameras) system that can’t be heard of anyone having them seized by veillance servers easily can compromised easily by attackers, you’ll customs, for example. Thus, the bad guy be locked down to need to do more. For starters, you’ll can simply carry around a WiFi jammer, make such a breach probably need to ditch Kmotion and look and all you’ll see on your surveillance more difficult. at ZoneMinder instead, and you’ll need system is one camera after another going Additionally, to be very careful about the cameras you offline. basic IP cameras use. So, unless the cameras buffer the im- with limited reso- ages and resend them when the network lution (e.g., Wired, Wireless, and IP is up, the bad guy can easily avoid detec- 320x200) cost One of the biggest mistakes people make tion. In other words, I recommend that about the same when they buy cameras for a surveil- you use wireless cameras only if you ab- lance system is selecting wireless cam- solutely have to or if you expect your at- eras. Now, I see the advantages: They tackers to be completely unsophisticated are really easy to install, and a power (which might actually be the case for source usually is easily accessible. Also, most of us). running network cable can be a real pain The second major difference between – each cable that needs to be run to a cameras is whether they are network ca- camera can cost a hundred dollars or pable (IP based) or not (directly wired more. But, wireless cameras also have into a video capture board). The advan- two tiny problems: They can be moni- tage of an IP-based camera is that you tored (so people can see what you’re can simply plug it into your network, seeing), and they are trivial to jam. without running special cables (usually Most wireless cameras come in two coaxial) from the surveillance system to flavors now: X10 and 802.11 (WiFi). The the camera. Also, multiple systems eas- X10 cameras have very little security in ily can make use of a single IP-based most cases, and the video signal often is camera. not encrypted. A good rule of thumb is: The disadvan- If the camera costs less than a few hun- tage to an IP- dred bucks, the signal is likely not en- based camera crypted. Most WiFi-based cameras, how- is that an at- ever, now support WPA2, but your sys- tacker with ac- tem is only as secure as your network cess to your net- passwords, so make sure they aren’t eas- work can intercept ily guessed. and monitor or even The jamming issue, on the other hand, modify video with a is basically impossible to fix. You can tool such as VideoJak [2]. KURT SEIFRIED Kurt Seifried is an Information Security Consultant specializing in Linux and networks since 1996. He often wonders how it is that technology works on a large scale but often fails on a small scale. 66 APRIL 2011 ISSUE 125 LINUX-MAGAZINE.COM | LINUXPROMAGAZINE.COM 066-067_kurt.indd 66 16.02.2011 12:00:00 Uhr FEATURES Security Lessons: Secure Video as “dumb” but much higher quality cially if you have many cameras. One so- wired cameras. lution is to get a video capture board that does on-board motion detection, Live Video Modification presenting the computer with pre-filtered In films, the bad guys often break into a footage. Unfortunately, such cards are video surveillance system, record a loop not widely available. However, of video with no events (i.e., an empty bluecherry [8], which sells a host of hallway or a bank vault with the jewels video capture cards guaranteed to work still inside), and feed that loop back to with ZoneMinder and provides open the system while they make off with the source drivers for their own boards, does loot (only to have the video loop fail at have such a card coming to market soon. some point, resulting in a really good I tested a beta version, and it works chase sequence). Although this scenario pretty well, especially if you’re using a is still possible, the technology is a lot computer with limited CPU power or more sophisticated. Until recently, you cooling issues. could usually assume that live video was Figure 1: An example of zones in Zone- a pretty good representation of the truth, Minder surveillance. (Reprinted with permis- Future of Surveillance but with modern technology, you can sion from Philip Coombes) The future is here – which is both good, modify video in real time. because some of the technology is very I recommend you pause here and In other words, unless you can prove cool, and bad, because some is definitely check out the video at LiveLeak [3]. If that the video stream from the camera to open to abuse. New high-end systems you haven’t watched it yet, I’ll spoil it the recording device is secure, you must not only detect motion but also analyze for you. Using a computer to modify the be wary of trusting video evidence. For- behavior (e.g., identifying people who video signal, you can simply circle an tunately, again, most people caught are fighting, jumping over a turnstile in a object, and, presto, it disappears from doing bad things on video are not that subway station, or breaking into a car). the video feed. The craziest part of the sophisticated. Face and gait recognition are also be- video is when they “remove” an object coming popular. These systems allow on a counter in front of a mirror – you A ZoneMinder Primer you to alert security automatically, for can still see the object in the mirror. First, use cameras that are wired directly example, when people who have been The technique used is quite simple to a capture board running on a Linux banned show up on the premises. and clever. The computer basically re- server. ZoneMinder (Figure 1) [5] ships In an Orwellian twist, some new cam- duces the resolution of the object and its with most major distributions, so instal- era systems can physically track individ- surroundings, then increases it, using lation won’t be a problem. Configura- uals and identify and track groups of video from around the object to rec- tion, however, might an issue because people, so you don’t need to hire some- reate the space the object occu- getting the settings right for your cam- one to follow people, you can just let the pied. This technique works es- eras can be tricky. I suggest using computer do it. If this technology be- pecially well on flat surfaces, comes widely deployed, who knows? such as a painted wall. xawtv -hwscan Maybe large-brimmed hats will come The kicker is that you back into fashion. nnn can modify the video to detect all local cameras [6]. and feed it back out in Second, spend some quality time with INFO less than 40ms. Assum- the web interface and put in all your [1] “Webcams” by Marcel Gagné, Linux ing a standard 30 cameras. Then, you can decide whether Magazine, December 2010, pp. 30-36 frames or so per second you want to capture all video (set the of video, this time pe- camera to function Monitor) or only [2] VideoJak: http://​­videojak.​­sourceforge.​­net/ riod represents a two- video when motion is detected (choose frame delay, which Modetect). Also, you can configure alerts [3] LiveLeak: http://​­www.​­liveleak.​­com/ very few systems will in case motion is detected. ZoneMinder view?​­i=639_1288445821 notice (network la- has a great interface for navigating his- [4] Canon OSK-E3 is proved useless: tency and jitter torical events for one or more cameras. http://​­www.​­elcomsoft.​­com/​­canon. alone can easily ac- For all the details on ZoneMinder setup, html?​­r1=pr&​­r2=canon count for 40ms). visit the wiki [7], which includes distri- [5] ZoneMinder: Even the use of bution-specific guides. http://​­www.​­zoneminder.​­com/ cameras with se- [6] xawtv: cure digital signing Motion Detection and http://​­linux.​­bytesex.​­org/​­xawtv/ probably won’t help CPU Usage [7] ZoneMinder main documentation: much, because such One problem with using motion detec- http://​­www.​­zoneminder.​­com/​­wiki/ systems are often flawed tion, however, is the amount of CPU index.​­php/​­Documentation [4]. time that you’re going to consume, espe- [8] bluecherry: http://​­bluecherry.​­net/ LINUX-MAGAZINE.COM | LINUXPROMAGAZINE.COM ISSUE 125 APRIL 2011 67 066-067_kurt.indd 67 16.02.2011 12:00:03 Uhr.
Recommended publications
  • 18 Free Ways to Download Any Video Off the Internet Posted on October 2, 2007 by Aseem Kishore Ads by Google
    http://www.makeuseof.com/tag/18-free-ways-to-download-any-video-off-the-internet/ 18 Free Ways To Download Any Video off the Internet posted on October 2, 2007 by Aseem Kishore Ads by Google Download Videos Now download.cnet.com Get RealPlayer® & Download Videos from the web. 100% Secure Download. Full Movies For Free www.YouTube.com/BoxOffice Watch Full Length Movies on YouTube Box Office. Absolutely Free! HD Video Players from US www.20north.com/ Coby, TV, WD live, TiVo and more. Shipped from US to India Video Downloading www.VideoScavenger.com 100s of Video Clips with 1 Toolbar. Download Video Scavenger Today! It seems like everyone these days is downloading, watching, and sharing videos from video-sharing sites like YouTube, Google Video, MetaCafe, DailyMotion, Veoh, Break, and a ton of other similar sites. Whether you want to watch the video on your iPod while working out, insert it into a PowerPoint presentation to add some spice, or simply download a video before it’s removed, it’s quite essential to know how to download, convert, and play these videos. There are basically two ways to download videos off the Internet and that’s how I’ll split up this post: either via a web app or via a desktop application. Personally, I like the web applications better simply because you don’t have to clutter up and slow down your computer with all kinds of software! UPDATE: MakeUseOf put together an excellent list of the best websites for watching movies, TV shows, documentaries and standups online.
    [Show full text]
  • Mapping the Internet and Intranets
    Visual Tools for Security: is there a There There? Bill Cheswick AT&T Labs - Research Shannon Labs [email protected] http://www.cheswick.com/ches/ 1 of 108 Saturday, October 10, 2009 Lucent Bell Labs اﻟﻜﺘﺎّ Not 2 of 108 Saturday, October 10, 2009 Limitations • I know more about security than visualization • The Related Works portion of this talk would be weak. • I’ll be around all week: feel free to set me straight 3 of 108 Saturday, October 10, 2009 The Case for Visualization • Complex software, networks, and network traffic are way too much for a human to grok • Visual input offers high bandwidth and native mental skills • other inputs too • Modern hardware: offering new opportunities to experiment 4 of 108 Saturday, October 10, 2009 5 of 108 Saturday, October 10, 2009 6 of 108 Saturday, October 10, 2009 Johnny Chung Lee (CMU) 7 of 108 Saturday, October 10, 2009 Saturn V mission control 8 of 108 Saturday, October 10, 2009 9 of 108 Saturday, October 10, 2009 10 of 108 Saturday, October 10, 2009 NORAD: War Games (1983) 11 of 108 Saturday, October 10, 2009 NORAD, 9/11 12 of 108 Saturday, October 10, 2009 AT&T GNOC 13 of 108 Saturday, October 10, 2009 AT&T GNOC 14 of 108 Saturday, October 10, 2009 15 of 108 Saturday, October 10, 2009 Accenture Global Network Ops 16 of 108 Saturday, October 10, 2009 I’ve seen a lot of ideas • and lots of startups • but actual deployment seems to be lagging • Microsoft hasn’t changed much in Windows • Mac has cover views and multitouch is coming to all • Cooliris 17 of 108 Saturday, October 10, 2009 Case in point: treemap • Treemap came out in 1992.
    [Show full text]
  • Who's Knocking?
    Who's Knocking? Mark G. December 8, 2018 This presentation gives an overview of a do-it-yourself, front door, security camera installation. Topics covered are a description of the installation, the camera, the live monitor, and the motion sensing and recording software. Technologies used in this system are: • Tools for infrastructure manipulation (ladder, drill, hammer, drywall saw) ; • Network equipment (power over ethernet switch, VLAN capable switches); • Security camera; • Raspberry Pi 3B, running Raspbian, with a seven inch display; • FreeBSD server running a jailed zoneminder system. Contents 1 Tools and Structure 4 1.1 Mounted Camera . .5 1.2 Live Display . .6 2 Network 9 2.1 Network Cables . .9 2.2 Patch Panel . 11 2.3 Power Over Ethernet Switch . 11 3 Camera 12 3.1 Configuration . 13 3.1.1 Camera System Settings . 14 3.1.2 Camera System Security . 17 3.1.3 Camera System User Management . 18 3.1.4 Camera Network Basic Settings . 19 3.1.5 Camera Network Advanced Settings . 21 3.1.6 Camera Video / Audio Settings . 23 1 4 Raspberry Pi Live Display 24 4.1 Process and Method for Use . 26 4.2 Configuration . 26 4.3 OMXPlayer . 27 4.3.1 loop control.sh . 28 4.3.2 omx.sh . 28 4.3.3 start.sh . 29 4.3.4 q.sh . 29 5 ZoneMinder - FreeBSD Jail on VLAN 30 5.1 Jail Network Settings . 30 5.2 Host /etc/jail.conf Section . 30 5.3 Jail /etc/rc.conf . 31 5.4 ZoneMinder Jail Installation . 32 List of Figures 1 Front door camera location overview ..................5 2 Camera's field of view ...........................5 3 Living room wall with live display off .................6 4 Living room wall with live display on .................7 5 Network closet access hole to the live display ............8 6 Network closet covered access hole ...................9 7 Network cables running up to the attic ...............
    [Show full text]
  • Main Page 1 Main Page
    Main Page 1 Main Page FLOSSMETRICS/ OpenTTT guides FLOSS (Free/Libre open source software) is one of the most important trends in IT since the advent of the PC and commodity software, but despite the potential impact on European firms, its adoption is still hampered by limited knowledge, especially among SMEs that could potentially benefit the most from it. This guide (developed in the context of the FLOSSMETRICS and OpenTTT projects) present a set of guidelines and suggestions for the adoption of open source software within SMEs, using a ladder model that will guide companies from the initial selection and adoption of FLOSS within the IT infrastructure up to the creation of suitable business models based on open source software. The guide is split into an introduction to FLOSS and a catalog of open source applications, selected to fulfill the requests that were gathered in the interviews and audit in the OpenTTT project. The application areas are infrastructural software (ranging from network and system management to security), ERP and CRM applications, groupware, document management, content management systems (CMS), VoIP, graphics/CAD/GIS systems, desktop applications, engineering and manufacturing, vertical business applications and eLearning. This is the third edition of the guide; the guide is distributed under a CC-attribution-sharealike 3.0 license. The author is Carlo Daffara ([email protected]). The complete guide in PDF format is avalaible here [1] Free/ Libre Open Source Software catalog Software: a guide for SMEs • Software Catalog Introduction • SME Guide Introduction • 1. What's Free/Libre/Open Source Software? • Security • 2. Ten myths about free/libre open source software • Data protection and recovery • 3.
    [Show full text]
  • AREDN Documentation Release 3.19.3.0
    AREDN Documentation Release 3.19.3.0 AREDN Jul 05, 2020 Guía de inicio 1 Información general de AREDN®3 2 Seleccionando el Hardware de Radio5 3 Descargando el Firmware AREDN®7 4 Instalación del Firmware AREDN®9 5 Basic Radio Setup 21 6 Estado del Nodo 25 7 Mesh Status Display 31 8 Advanced Configuration 35 9 Resumen de redes 51 10 Network Topologies 53 11 Características del espectro radioeléctrico 57 12 Planificación de canales 63 13 Network Modeling 73 14 AREDN® Services Overview 79 15 Chat Programs 83 16 Email Programs 91 i 17 File Sharing Programs 95 18 VoIP Audio/Video Conferencing 99 19 Video Streaming and Surveillance 107 20 Computer Aided Dispatch 115 21 Other Possible Services 119 22 Firmware Upgrade Tips 125 23 Comparing SISO and MIMO Radios 127 24 How-to Use PuTTYGen on Windows to Make SSH Keys and Use Them on AREDN® Nodes 131 25 Settings for Radio Mobile 141 26 Test Network Links with iperf 145 27 Tools for Developers 147 28 Frecuencias y canales 153 29 Información adicional 155 ii AREDN Documentation, Release 3.19.3.0 Version 3.20.3.0 Esta documentación está compuesta de diferentes secciones, las cuales se muestran en el panel de navegación. • La Guía de inicio recorre el proceso de configuración de un nodo radio de AREDN® como parte de una red mallada. • La Guía de diseño de red proporciona información general y consejos para planificar y desplegar una red mallada de forma robusta. • La Guía de aplicaciones y servicios analiza los tipos de programas o servicios que pueden ser utilizados a través de la red mallada.
    [Show full text]
  • Ubuntu:Precise Ubuntu 12.04 LTS (Precise Pangolin)
    Ubuntu:Precise - http://ubuntuguide.org/index.php?title=Ubuntu:Precise&prin... Ubuntu:Precise From Ubuntu 12.04 LTS (Precise Pangolin) Introduction On April 26, 2012, Ubuntu (http://www.ubuntu.com/) 12.04 LTS was released. It is codenamed Precise Pangolin and is the successor to Oneiric Ocelot 11.10 (http://ubuntuguide.org/wiki/Ubuntu_Oneiric) (Oneiric+1). Precise Pangolin is an LTS (Long Term Support) release. It will be supported with security updates for both the desktop and server versions until April 2017. Contents 1 Ubuntu 12.04 LTS (Precise Pangolin) 1.1 Introduction 1.2 General Notes 1.2.1 General Notes 1.3 Other versions 1.3.1 How to find out which version of Ubuntu you're using 1.3.2 How to find out which kernel you are using 1.3.3 Newer Versions of Ubuntu 1.3.4 Older Versions of Ubuntu 1.4 Other Resources 1.4.1 Ubuntu Resources 1.4.1.1 Unity Desktop 1.4.1.2 Gnome Project 1.4.1.3 Ubuntu Screenshots and Screencasts 1.4.1.4 New Applications Resources 1.4.2 Other *buntu guides and help manuals 2 Installing Ubuntu 2.1 Hardware requirements 2.2 Fresh Installation 2.3 Install a classic Gnome-appearing User Interface 2.4 Dual-Booting Windows and Ubuntu 1 of 212 05/24/2012 07:12 AM Ubuntu:Precise - http://ubuntuguide.org/index.php?title=Ubuntu:Precise&prin... 2.5 Installing multiple OS on a single computer 2.6 Use Startup Manager to change Grub settings 2.7 Dual-Booting Mac OS X and Ubuntu 2.7.1 Installing Mac OS X after Ubuntu 2.7.2 Installing Ubuntu after Mac OS X 2.7.3 Upgrading from older versions 2.7.4 Reinstalling applications after
    [Show full text]
  • A Report from an European Project Based in OSS for Smes
    The Small/Medium Enterprise guide to Open Source Software Carlo Daffara This guide (developed in the context of the FLOSSMETRICS and OpenTTT projects) present a set of guidelines and suggestions for the adoption of open source software within SMEs, using a ladder model that will guide companies from the initial selection and adoption of FLOSS within the IT infrastructure up to the creation of suitable business models based on open source software. The guide is split into an introduction to FLOSS and a catalog of open source applications, selected to fulfill the requests that were gathered in the interviews and audit in the OpenTTT project. The application areas are infrastructural software (ranging from network and system management to security), ERP and CRM applications, groupware, document management, content management systems (CMS), VoIP, graphics/CAD/GIS systems, desktop applications, engineering and manufacturing, vertical business applications and eLearning. This is the final edition of the guide in the context of the FLOSSMETRICS project; the guide is distributed under a CC-attribution-sharealike 3.0 license. The author is Carlo Daffara ([email protected]). The wiki on which this guide is based is available at the address http://guide.conecta.it or through the main project website, http://www.flossmetrics.eu; ongoing research updates will be published at the author's website, (http://carlodaffara.conecta.it) Table of Contents The Small/Medium Enterprise guide to Open Source Software.........................1 1. What's Free/Libre/Open
    [Show full text]
  • Revecom Vol. 6 No. 2
    Revista Venezolana de Computación ISSN: 2244-7040 http://www.svc.net.ve/revecom Vol. 6, No. 2, pp. 21-29, Diciembre 2019 Fecha recepción: 14/12/2019, Fecha aceptación: 10/05/2020 de Computación Extendiendo ZoneMinder para su Uso Masivo con una Refactorización de las Interfaces de Administración y la Integración de un Módulo de Reconocimiento Facial Ilich Rondon1, Kenny Jimenez1, Dedaniel Urribarri1, Eric Gamess2 [email protected], [email protected], [email protected], [email protected] 1 Escuela de Computación, Universidad Central de Venezuela, Caracas, Venezuela 2 MCIS Department, Jacksonville State University, Jacksonville, AL, USA Resumen: A través de los años, los requerimientos de monitoreo y control de sitios de importancia en empresas, instituciones, e inclusive hogares, se han incrementado. La solución inicial fue la implementación de CCTV (Circuitos Cerrados de TeleVisión) basados en cámaras analógicas y restringida a usuarios pudientes. Además de los altos costos, esta solución carecía de sensores de movimientos. Frente a estas limitaciones, surgió una alternativa conocida como video vigilancia IP que usa la red de datos preexistente. Debido al auge de la video vigilancia IP, se hace necesario un software libre, con capacidad de administración centralizada para cámaras IP, con pocos requerimientos de cómputo, y una interfaz sencilla y amigable que permita visualizar las proyecciones y configurar de forma remota los parámetros de monitoreo. En este trabajo, se desarrolló un NVMS (Network Video Management System) basado en software abierto, con reconocimiento facial, que pueda ser usado por usuarios con pocos conocimientos en el área, como una solución de monitoreo de espacios pequeños o medianos.
    [Show full text]
  • Controlling the Trendnet TV-IP400W Camera with Zoneminder Development, Home Automationaugust 14Th, 2007
    sfpeter.com » Blog Archive » Controlling the T re... http://www.sfpeter.com/2007/08/14/controlling-the... Controlling the Trendnet TV-IP400W camera with ZoneMinder development, Home AutomationAugust 14th, 2007 Update (7/18/08): this driver and instructio ns wo rk fo r Z o neMinder 1.22.x o nly, see my update fo r Z M 1.23.x suppo rt. I can’t even rem em ber when was the last tim e that I had to reverse engineer something.. it m ay have been as long ago as m y college days. But last week I had a couple of evenings of fun figuring out the inner workings of m y Trendnet TV-IP400W. This is a cool little internet cam era with built in wifi and a built in web server. You can control it from a browser and you can actually pan and tilt this cam era around the room, so even though the picture quality isn’t great (probably comparable to your average webcam ), it can be very useful if you want to keep an eye on your house, your pets, your baby, etc from anywhere in the world. The best part: you can pick one up online for less than $200, which is a steal for a pan/tilt IP cam era. The built in web server is useful for checking up on the live situation, but it does not have any features to automatically notify something or someone if m otion is detected in front of the cam era. The windows control application does do m otion triggered recording, but if you want to m onitor your cam era from outside your home you’ll have to set it up to em ail all the videos to yourself, as the windows app can’t function as a web interface.
    [Show full text]
  • AREDN Documentation Release 3.21.4.0
    AREDN Documentation Release 3.21.4.0 AREDN Jul 19, 2021 Getting Started Guide 1 AREDN® Overview3 2 Selecting Radio Hardware5 3 Downloading AREDN® Firmware7 4 Installing AREDN® Firmware9 5 Basic Radio Setup 21 6 Node Status Display 27 7 Mesh Status Display 33 8 Configuration Deep Dive 37 9 Networking Overview 57 10 Network Topologies 59 11 Radio Spectrum Characteristics 63 12 Channel Planning 69 13 Network Modeling 79 14 AREDN® Services Overview 85 15 Chat Programs 89 16 Email Programs 97 i 17 File Sharing Programs 101 18 VoIP Audio/Video Conferencing 105 19 Video Streaming and Surveillance 113 20 Computer Aided Dispatch 121 21 Other Possible Services 125 22 Firmware First Install Checklists 131 23 Firmware Upgrade Tips 133 24 Connecting Nodes to Home Routers 135 25 Creating a Local Package Server 137 26 Comparing SISO and MIMO Radios 141 27 Use PuTTYGen to Make SSH Keys 145 28 Settings for Radio Mobile 155 29 Test Network Links with iperf 159 30 Changing Tunnel Max Settings 161 31 Tools for Developers 165 32 Frequencies and Channels 171 33 Additional Information 173 34 License 175 ii AREDN Documentation, Release 3.21.4.0 Link: AREDN Webpage Release 3.21.4.0 This documentation set consists of several sections which are shown in the navigation list. • The Getting Started Guide walks through the process of configuring an AREDN® radio node to be part of a mesh network. • The Network Design Guide provides background information and tips for planning and deploying a robust mesh network. • The Applications and Services Guide discusses the types of programs or services that can be used across a mesh network.
    [Show full text]
  • Logiciel De Vidéosurveillance Open Source
    POINT DE VUE Logiciel de vidéosurveillance Open Source a guerre des prix a commencé dans le bas de gamme du marché de la sécurité. Vous pouvez, aujourd’hui, acheter un système de vidéosurveillance pour quelques cen- L taines d’euros. Des communications récentes laissent cependant entendre que ce type de systèmes comporte souvent des logiciels douteux. Ainsi, fin 2015, il a été découvert une porte dérobée dans le micrologiciel d’un système de vidéosurveillance très bon marché. Cette porte dérobée permettait de réaliser des captures d’écran et de les envoyer vers une adresse e-mail en Chine. Si vous êtes à la recherche d’un système de vidéosurveillance bon marché, tout en maîtrisant la sécurité du logiciel, un système libre ‘Open Source’ peut offrir une alternative flexible. « Open Source » signifi e littéralement « code source ouvert », ce qui implique que le code source du logiciel peut être utilisé, consulté et modifi é librement. Beau- coup de produits Open Source, disposent d’un vaste réseau de développeurs et d’uti- lisateurs. Les membres de ces réseaux peuvent faire des propositions de change- ment ou d’amélioration du code existant. Les défauts de protection peuvent être ainsi détectés rapidement et les mises à jour de protection rapidement diffusées. Il en ré- sulte un ensemble logiciel sécurisé, aussi bien aujourd’hui qu’à l’avenir. Zoneminder Zoneminder est basé sur un logiciel libre « Open Source » et sur le système d'exploi- tation Linux. Il peut être utilisé comme sys- tème de vidéosurveillance. Outre le logiciel Zoneminder il faut également les logiciels MySQL et PHP.
    [Show full text]
  • Introduction Il Y a Quelques Temps Mon Garage a Été Cambriolé Et Tous
    Introduction Il y a quelques temps mon garage a été cambriolé et tous mes outils ont été volés ! J‘ai vite réalisé que si j‘avais eu une caméra observant la porte j‘aurais pu savoir qui avait commis cet acte. C‘est ainsi qu‘est naît ZoneMinder. Il est encore relativement jeune mais évite de tels incidents et peut même conduire leurs auteurs en justice. NOTA la plupart des « systèmes de surveillance » commerciaux sont conçus comme des systèmes de monitoring qui enregistrent. La qualité des enregistrements est souvent très mauvaise et inexploitable. De plus la localisation de la vidéo utile est difficile et l’exportation des données utiles ne peut se faire que manuellement. ZoneMinder a été conçu pour enregistrer et pour faciliter les recherches grâce à une indexation des événements dans une base de données. Les enregistrements sont de la meilleure qualité possible, elles sont faciles à filtrer et à rechercher et faciles à exporter à l’aide d’un simple navigateur web ZoneMinder a été conçu à partir de composants indépendants permettant d‘optimiser les ressources utilisées par votre machine. Un ancien PC Pentium II PC sera capable d‘enregistrer une caméra à plus de 25 images par secondes. Chaque caméra supplémentaire fera diviser par deux le nombre d‘images traitées par seconde mais même le monitoring de plusieurs caméras ne surchargera pas le CPU puisque le mécanisme de traitement des images est conçu pour se synchroniser avec la capture. Tout en étant rapide ZoneMinder est conçu pour être intuitif et utile. Il dispose d‘une interface Web en PHP vous permettant de contrôler et de surveiller vos caméras de chez vous, au travail, sur la route ou même à partir d‘un Smartphone.
    [Show full text]