Sunday, October 31, 2010

postheadericon The 13 Scariest Computer Viruses

10/29/2010 The 13 Scariest Computer Viruses

It 's that time of year again - when the ghosts, ghouls and goblins roam the streets as eating candy for breakfast is quite acceptable, and all who love to scare the crap out of your friends is recommended ... It is obvious that "I have Halloween on the brain (Editor's Note: braaaaaaiiins), we 've been screening for Dead Set in the photo lab all week, our staff costumes roam halls and all the 'S got a good sound sugar. But our favorite part of Halloween ISN 't sweets - it' S creepy, crawly, cooling parts. A computer virus is as frightening as the zombie outbreak. Below, we count 13 worst computer viruses.

                       One botnet, two botnet, hahahaha!

13: ILOVEYOU Worm

The ILOVEYOU Worm was just a simple Visual Basic Script that wreaked havoc on just about every file on your hard drive. As if that weren’t devious enough, the ILOVEYOU Worm really shows off its demented roots with its method of deliveries: disguising itself as a love letter. It proved to be an extremely effective way to infect systems, claiming over 50 million victims in little over a month. We geeks tend to be a somewhat lonely bunch, and it’s just unfair to entice us with promises of love.

12: Here You Have Worm

Even though the ILOVEYOU Worm was defeated ten years ago, its spirit lives on. Just a few months ago, the “Here you have” Worm tricked recipients into opening e-mail attachments claiming to be work-related documents. Fortunately, improved software security prevented this virus from being significantly successful, but its familiar delivery tactics remind us of the heartbreak of reformatting our beloved computers ten years ago.

11: FakeAlert Trojans

FakeAlert Trojans have become alarmingly common lately, showing up in a multitude of flavors, such as Internet Security 2010, Antivirus 2011, Desktop Security 2010, and Security Essentials 2010. They infect their victims by creating advertisements that look like very convincing virus alerts. Clicking the ad then installs the “antivirus” program, which is actually the virus. Corporate and family computers are the most common victims, simply because workers and children are too embarrassed to admit they stumbled upon a virus and attempt to repair it themselves. Why is this so scary? Well, who do you think has to fix all these computers? Us, the computer geeks

10: Alureon

The Alureon virus has come and gone over the years, but it is making another comeback by bundling itself with various FakeAlert Trojans. While its MO isn’t all that different from most Trojans, stealing passwords and credit card info, and causing Blue Screens of Death, it also does something very annoying. Alureon can hijack your search engine, turning simple Google quarries into links to even more viruses. Because it can redirect any link in your web browser, it makes downloading removal tools extremely difficult if you don’t have a spare computer.

9: Fake Virus of Doom

Geeks have been pulling silly computer pranks on each other for as long as there have been computers. Some of the pranks are simple, like taking a screenshot of someone’s desktop, setting it as the wallpaper, and then hiding all of his desktop icons. Others are a bit more complex, like the Fake Virus of Doom. Just placing a simple flash video into your buddy’s Startup folder is all it takes to scare the crap out of him.

8: Kenzero

Kenzero is a recent virus, first popping up just a couple months ago. It’s not particularly prevalent, nor is it particularly destructive. Because it is distributed through P2P networks, the majority of its targets are those partaking in illegal file sharing, sort of like a villainous hero, but its MO is a bit more disturbing. Kenzero monitors and records the victims browsing habits and threatens to post them to the public unless the victim purchases certain items or installs certain programs. It’s a bit frightening and unsettling to think that our private lives can be exposed by a virus.

7: BooNana

 


6: iKee

5: AndroidOS FakePlayer

With jailbroken iPhones being Rickrolled and open to certain forms of attack, it’s not surprising to hear that Google’s Android OS is susceptible to viruses as well. FakePlayer was the first virus to be discovered targeting Android OS. It spread in the form of a Trojan disguised as a media player, and once installed, it began sending SMS messages to charge-per-text phone numbers, raking in profits for the scammers and sending your phone through the roof. Not even our smartphones are safe anymore!

4: Mariposa Botnet

While it wasn’t the result of any single virus, the Mariposa Botnet was a very large network of over 13 million zombified PCs, and even though it was dismantled and its creators arrested earlier this year, one very scary fact still remains: the entire Mariposa Botnet was created by just a couple of amateur hackers using Kiddie Scripts. It used to be that only a handful of people in the world had the knowledge that it took to create such a complex network of bots, but now anyone with a basic understanding of computer programming and access to the write scripts can accomplish the same thing.

3: Storm Worm 2

2: Stuxnet

1: Skynet

Speaking of Skynet, that brings us to our number one scariest computer virus of all. As everything in our lives becomes integrated with everything else, all tied together with a tangle of wires in cyberspace, it’s just a matter of time before every aspect of our lives to become vulnerable to cyber attacks. Encryptions, firewalls and cyber security will increase of course, but how can you stop an evil, super intelligent computer system intent on destroying the world as we know it? We must send the Governator of California back in time!




Monitored Alarm Systems
Thursday, October 7, 2010

postheadericon Iran detains 'spies' over Stuxnet cyber attack

10/03/2010 Iran detains 'spies' over Stuxnet cyber attack

Intelligence chief blames western powers for computer worm targeting nuclear systems

Iran had detained several "spies" involved in attempts to sabotage the country's nuclear programme through cyberspace, the Iranian intelligence minister, Heydar Moslehi, said.

The announcement yesterday follows the attack on industrial computer systems in Iran by the Stuxnet worm, designed to disrupt its nuclear facilities, including the Bushehr power plant.

Although officials attempted to play down the significance of the Stuxnet attack, which had infected more than 30,000 computers, Moslehi's comments, apparently meant to reassure Iranians, suggest the cyber attack had caused more alarm in the regime than has so far been acknowledged.

Suspicions have also been growing in recent days that the Stuxnet worm may have been designed as much to spy on the systems as to destroy them.

In his speech, carried on Iranian television condition and maintenance Mehr News, Moslehi said that Iran has opened a "destructive activities arrogant [Western powers] in cyberspace", adding that "the various ways of dealing with them have been developed and implemented ".

He added: "I assure all citizens that the intelligence apparatus currently has complete supervision of cyberspace and will not allow any leak or destruction of our country's nuclear activities."

Moslehi gave no details of when the arrests had taken place or whether those detained were Iranians or citizens of another country.

Peter Beaumont

guardian.co.ukGuardian News & Media Limited 2010 | Use of this content in accordance with our terms and conditions | Feeds





Monitored Alarm Systems
Saturday, September 25, 2010

postheadericon Promoting statistical literacy: a proposal

09/21/2010 Promotion of statistical literacy: a proposal

Why do our institutions â€" particularly banks â€" fail to grasp the most rudimentary basics of password security?

Here's a modest proposal: what if the government took it on board to promote a reasonable, sane grasp of risk, security, and probability? Or, if you're a "Big Society/Small Government" LibCon, how about a more modest mandate still: we could ask the state to leave off promoting statistical innumeracy and the inability to understand risk and reward.

Start with the lottery: in the US, its slogan is "Lotto: You've Got to Be In It to Win It". A more numerate slogan would be "Lotto: Your Chance of Finding the Winning Ticket in the Road is Approximately the Same as Your Chance of Buying it". The more we tell people that there is a meaning gap between the one-in-a-squillion chance of finding the winning ticket and the one-in-several-million chance of buying it, the more we encourage the statistical fallacy that events are inherently more likely if they're very splashy and interesting to consider.

Blocking bingo? T Wouldn ', what it means to lose all the money a wonderful lessons through a voluntary tax on innumeracy? Maybe, but if you get rid of the lottery could lead to a slight increase in sense of risk and safety, think about the society-wide saving money is not spent on the alarmist newspaper, the charlatan child protection schemes, MMR scare and how!

Once we get rid of the lottery, let 'S attack banks. It 's not bad enough that they collect huge bonuses from the state, destroying the economy, they also systematically disorder our ability to understand risk and security on the basis of all more farcical stream "respect" hoops and Bizarro World "Security" action!

For example, my own bank, the Co-op, recently updated its business banking site (the old one was "best viewed with Windows 2000!"), "modernising" it with a new two-factor authentication scheme in the form of a little numeric keypad gadget you carry around with you. When you want to see your balance, you key a Pin into the gadget, and it returns a 10-digit number, which you then have to key in the browser field, helpfully mask your keystrokes when you enter this huge one-time password.

Don't get me wrong: two-factor authentication makes perfect sense, and there's nothing wrong with using it to keep users' passwords out of the hands of keyloggers and other surveillance creeps. But a system that locks users out after three bad tries does not need to generate a 10-digit one-time password: the likelihood of guessing a modest four- or five-digit password in three tries is small enough that no appreciable benefit comes out of the other digits (but the hassle to the Co-op's many customers of these extra numbers, multiplied by every login attempt for years and years to come, is indeed appreciable).

As if to underscore the Co-op's security illiteracy, we have this business of masking the one-time Pin as you type it. The whole point of a one-time password is that it no it does not matter if it leaks, because it only works times . It 's why we call it "one-off contact." Asking customers to key in the meaningless 10-digit code perfectly, every time, without visual feedback, ISN' T security. It 's sadism.

It gets worse: the Pin you use with the gadget is your basic four-digit Pin, but numbers can't be sequential. This has the effect of reducing the keyspace by an enormous factor â€" a bizarrely contrarian move from a bank that "improves" its security by turning this constrained four-digit number into a whopping 10-digit one. Does the Co-op love or loathe large keyspaces? Both, it seems.

It's not just the Co-op, of course â€" this is endemic to the whole industry. For example, Citibank UK requires you to input your password by chasing a tiny, on-screen, all-caps password with your mouse-pointer, in the name of preventing a keylogger from capturing your password as you type it. This has the neat triple-play effect of slicing the keyspace in half (and more) by eliminating special characters and lower-case letters; incentivising customers to use shorter, less secure passwords because of the hassle of inputting them; and leaving it vulnerable to all screen-recorders, which just make movies, what keys you mouse.

It wasn't easy â€" the branch staff couldn't believe that I had won an exception to this weird policy â€" but in the end, they opened the account for me. Now, like a mouse that's found an experimental lever that only sometimes gives up a pellet, I find myself repeatedly pressing it, hoping to hit on the magical combination that will get my bank to behave as though security was something that a reasonable, sane person could understand, as opposed to a magic property that arises spontaneously in the presence of sufficient obfuscation and bureaucracy.

The irony, of course, is that all banks will tell you that they 'Re just put you through hell pointless security, because the FSA or any other body, put them to him. Regulators strenuously denies this, saying that they only have to specify the principles - "you will know your client" - not a particular practice.

Which brings me back to my modest proposal: let's empower our regulators to fine banks that create nonsensical, incoherent security practices involving idolatrous worship of easy-to-forge utility bills and headed paper, in the name of preserving our national capacity to think critically about security.

Even if it doesn't kill the power of the tabloids to sell with screaming headlines about paedos, terrorists and vaccinations, it would, at least, be incredibly satisfying to keep your money in an institution that appears to have the most rudimentary grasp of what security is and where it comes from.

Cory Doctorow

guardian.co.uk ? Guardian News & Media Limited 2010 | Use of this content is subject to our Terms & Conditions| Feeds





Monitored Alarm Systems
Sunday, September 19, 2010

postheadericon Robot warfare: call for tighter controls

09/16/2010 Robot warfare: call for tighter controls

Conferences will raise concerns over unpiloted aircraft and ground machines that choose their own targets

The rapid proliferation of military drone planes and armed robots should be subject to international legal controls, conferences in London and Berlin will argue this month.

Public awareness of attacks by unmanned aerial vehicles (UAVs), such as Reapers and Predators, in Afghanistan and Pakistan has grown but less is known of the evolution of unmanned ground vehicles (UGVs).

Two conferences â€" Drone Wars in London on 18 September and a three-day workshop organised by the International Committee for Robot Arms Control(ICRAC) in Berlin on 20-22 September - will hear calls for bans and stricter rules in the framework of international treaties on arms limitation.

British academics and policy experts, Red Cross representatives, peace activists, military advisers, human rights lawyers and those opposed to the arms trade are participating in the German meeting.

Prominent among them is Noel Sharkey, professor of robotics and artificial intelligence at Sheffield University and a judge on the BBC series Robot Wars, who is speaking at both gatherings.

The development of what is known as "autonomous targeting" â€" where unmanned planes and military ground vehicles are engineered to lock automatically on to what their onboard computers assume is the enemy â€" has heightened concern.

Research is under way at enabling UAVs and UGVs to work in collaborative swarms, ensuring each machine selects a different target. This has reinforced fears that UAV strikes along the Afghanistan-Pakistan border and in the Horn of Africa â€" or wherever future wars are fought â€" will increase death tolls.

RAF pilots already operate armed drones from Creech US air force base in the Nevada desert. Eight thousand miles away from the frontline they control the release of Hellfire missiles and Paveway bombs against Taliban targets.

Through a freedom of information request submitted to the Ministry of Defence, the Oxford-based Fellowship of Reconciliation â€" the group organising the Drone Wars conference â€" found that as of April this year RAF-controlled Reapers had opened fire on 84 occasions so far this year.

Defence equipment manufacturers insist that there is always "a man in the [control] loop" to authorise operations and that they are far less indiscriminate than the high level air force saturation bombing that occurred in the second world war. Since there is no onboard pilot at risk, so the argument goes, they do not always have to fire first.

Philip Alston, a UN human rights special rapporteur, warned last autumn that US use of drones to kill militants in Afghanistan and Pakistan may violate international law. He called on the US to explain the legal basis for killing individuals with its drones.

"More than 40 countries have robotic programmes now," said Sharkey. "Even Iran has launched a UAV bomber with a range of several hundred miles.

"These [robotic] systems are difficult to develop but easy to copy. In the states a large proportion of robot making is being moved to Michigan to compensate for the decline in the car industry.

"Increasingly [the manufacturers] are talking about the 'man on the loop', where one person can control a swarm of robots. Our biggest concern for the future is autonomous systems that [select] targets themselves."

Dr Steve Wright, a reader in applied global ethics also at Leeds Metropolitan University who will speak at an ICRAC workshop on the dangers of terrorists obtaining drones, said: "We need a new treaty to limit proliferation. All the arms fairs now are selling UAVs. It's naive to think they will remain in the hands of governments."

Owen Bowcott

guardian.co.uk ? Guardian News & Media Limited 2010 | Use of this content is subject to our Terms & Conditions | More Feeds





Monitored Alarm Systems
Thursday, September 16, 2010

postheadericon Google Engineer Fired For Spying On Teen Users; Serious Privacy Concerns Raised

09/15/2010 Google Engineer Fired For Spying On Teen Users; Serious Privacy Concerns Raised , mainly for the sake of showing off to them. Google has fired the guy, and also admitted that it knows of one other similar security breach, which involved another employee who was then fired.

What's still rather alarming, however, is that this was possible, and that, despite all of Google's claims of security and procedures to keep these things from happening, the news did not come out until Google was alerted to the actions by parents of some of the teens involved. Google is notoriously secretive on these issues, and its "statement" on this matter, frankly, is pretty weak:
"We dismissed David Barksdale for breaking Google's strict internal privacy policies. We carefully control the number of employees who have access to our systems, and we regularly upgrade our security controls--for example, we are significantly increasing the amount of time we spend auditing our logs to ensure those controls are effective. That said, a limited number of people will always need to access these systems if we are to operate them properly--which is why we take any breach so seriously."
That doesn't explain anything about how Google makes sure these kinds of things won't happen again. I certainly can understand that there's always going to need to be some people who can access certain systems, but the question is what Google does to make sure that access is not just limited, but monitored to avoid serious abuses like this. At a time when Google is under such strict scrutiny for privacy issues, this news and Google's response are simply unacceptable.

Permanent link | Comments | Email This Story





Monitored Alarm Systems
Friday, August 27, 2010

postheadericon Carry-Air w/CO Monitor Systems

[[[Carry-Air w/CO Monitor Systems]]]



Discription : 9875 This item features: -Allegro s Air Filtration Panels convert shop air used for pneumatic tools and equipment to clean breathable air. -The 3-stage filtration system purifies compressed air removing water, oil and particulate contaminants. -A carbon monoxide monitor, which can be operated in AC or DC mode, activates an audible alarm when the concentration of CO exceeds 10 ppm (set for 5 ppm in Canada). -Flow: 65.0 CFM [Max]. -Inlet Pressure: 150 psig [Max]. -Wt.: 22 lb. -Type: 5 Worker. -Price is for 1 Each.


A detailed review soon.









Buy here (at discount) Carry-Air Well / CO Monitor System

postheadericon Fire-Lite HFS-MM, Addressable Mini-Monitor Module

[[[Fire-Lite HFS-MM, Addressable Mini-Monitor Module]]]



Discription : The HFS-MM Intelligent Mini Monitor Modules for use with Fire-Lite MS-25 (E) Fire Alarm Control Panel. The HFS-MM is designed to be used with pull stations, water flow switches, and other applications requiring dry contact alarm initiation devices.


More review coming soon.









Buy here (at discount) Fire-Lite HFS-MM Addressable Mini Monitor Module

Thursday, August 26, 2010

postheadericon Mommy I'm Here cl-103br Child Locator, Brown

[[[Mommy I'm Here cl-103br Child Locator, Brown]]]



Discription : MOMMY IM HERE CL-103-BR BROWN BEAR CHILD SECURITY DEVICE UNIQUE CHILD SECURITY DEVICE IN BROWN BEAR DESIGN; WORKS UP TO 150 FT AWAY & EMITS A LOUD 86 DB SOUND; SECURELY AFFIXES TO CHILDS SNEAKER LACES OR BELT; EASY TO USE BY TURNING ON BEAR RECEIVER & PUSHING TRANSMITTER BUTTON ONCE; HELPS KEEP TRACK OF A CHILD AT ANY TIME; WATER-RESISTANT RECEIVER; PARENT-INVENTED & FCC-CERTIFIED; INCLUDES LIFELONG BATTERIES


More review coming soon.



I bought this to use in Disney World. I didn't really use this device on our trip, because it was so sensitive that it would go off accidently when lightly touched as we were walking around. It was very loud. If I had needed it this would have worked from pretty far away and would have gotten others attention. I wish it didn't go off when it was barely bumped because it would have been a great for my piece of mind.

I love this little thing! It is very loud! And my daughter thinks its fun to wear the pink bear!

Keep relaxed and aware of your child's whereabouts with the Mommy I'm Here Child Locator, a small two-unit wireless device. The cute, brown, teddy-bear-shaped unit mounts easily to a child's shoe or belt. Ideal in public environments such as malls, the unit communicates with a keychain transmitter you keep on hand. Whenever you notice that a child has wandered too far, you simply press the button on the keychain and the teddy bear receiver produces an audible alert that's easy to track.


Great for a full day of activities, the receiver includes long-life batteries.

With a broad 150-foot range, the unit is a perfect choice for use in public places.

The sturdy receiver is water-resistant and attaches securely to shoes, belts, and more.
The Peace of Mind of Wireless Child Location
If you often find yourself worried for your child's security in public venues, or simply want to keep track of his or her location, the Mommy I'm Here locator is your answer. This unique, fun-themed wireless child locator system is a great way to keep track of your child in any public location, such as a mall, airport, theme park, or sporting arena.

The locator is a two-unit system--one that attaches to your child and one you keep with you. If you notice that your child has strayed, press the button on the keychain transmitter to activate/ set off the alarm on the bear. The loud, 86-decibel alarm on your child's unit then allows you to find him or her quickly and easily.

And the locator works from over 150-feet away, making it perfect for large venues and outdoor areas. The units establish their own proprietary frequency with each use, so inter-unit communication is strong and reliable.

Cute Teddy Bear Receiver Attaches to Child's Shoe or Belt
The playful teddy-bear-shaped receiver comes in a classic teddy-bear-brown color. (You can also choose pink.) The receiver comes with a sturdy mounting loop, so it can be attached easily to a child's shoelaces, Velcro straps, or belt, becoming a cute accessory for them and unbeatable reassurance for you.

If you've ever dealt with physical locator solutions like leashes or harnesses, you will appreciate the wireless design of this locator. With the Mommy I'm Here Child Locator, you can keep your leashes on your pets and walk freely with your child without worry.

Durable Unit is Water Resistant and Long-Lasting
Designed by parents for parents, the Mommy I'm Here offers several realistic assets any parent or guardian will appreciate. To begin with, it comes pre-installed with batteries, so you can start using it right away. Have a long day of activities planned? With this locator, it's no problem--the long-life batteries deliver hours of operation. And because it's engineered with active children in mind, the receiver is sturdy and water resistant.

Want to keep track of more than one child? That's no problem, either--you can operate more than one teddy bear receiver with a single keychain transmitter.

What's in the Box
Mom I 'M Here CL-103pk Child Locator (Brown) with batteries

Amazon.com Product Description
Buy Here (for discount) Mommy I'm Here cl-103br Child Locator, Brown

Wednesday, August 25, 2010

postheadericon Is Malware To Blame For Plane Crash That Killed 154?

08/23/2010 Is malware blame Plane Crash that killed 154? As someone who flies all too frequently, I'd be lying if I said I wasn't a bit spooked by a report that the Spanair flight 5022 crash from two years ago may have been caused -- at least in part -- by malware on a computer that failed to detect three technical problems. Apparently, the computer which monitored those things got some sort of trojan horse, and may have failed to set off the necessary alarms because of this. As for how the computer got infected... it sounds like investigators still are not sure, but someone sticking in an infected USB stick or some other remote network connection seem like the most likely culprit. Of course, the reports seem woefully lacking in details. It's unclear how a trojan would block some software from alerting the crew that there was a problem with the aircraft. Honestly, the report seems to raise a lot more questions than it answers, and if it's actually true, it makes me wonder why we're relying on software that can be disabled via some random malware to watch for life-and-death safety issues on airplanes...

Permalink| Comments | Email This story





Monitored Alarm Systems
Saturday, August 21, 2010

postheadericon Kane & Lynch 2 review

08/17/2010 Kane and Lynch 2 Review

PS3/Xbox 360/PC: £ 49,99; certificate 18 +; Square Enix

A former mercenary and a self-medicating psychopath respectively, Kane and Lynch return for a second slice of grisly, gun-heavy entertainment.

This time around, Lynch is living in Shanghai with his girlfriend and Kane has one final job to complete. This last payday should be straightforward but straightforward does not a shoot-em-up make and, within a level or two, it's all gone mammaries skyward. A local crime lord's daughter is dead at their hands. Lynch's girlfriend has been abducted. Hundreds of well-armed gangsters are on their tail, former allies have turned on them and the police are also shooting to kill. And thus the scene is set for assorted stand-offs and carefully timed gun play.

Given the ancestry and the typical evolutionary process of games, it won't come as a surprise that Kane & Lynch 2 ups the intensity and gore quotient considerably. It cleverly masks some of the excesses with handily positioned, pixellated censorship â€" which, to be fair, adds to the documentary sense of the game. Yes, the shaky cam stuff is a shortcut to immediacy but, as Paul Greengrass will tell you, it works and it's that verité grit, and the realism of the visuals, that give Kane & Lynch its not-so-unique selling point. Without those, and the not-bad-at-all multiplayer mode, this would be an alarmingly short disappointment.

Some extra value is provided by the returning Fragile Alliance multiplayer games. Here you and your mates can commit elaborate heists and either celebrate together for a job well done or attempt to screw one another over by stabbing them in the back and keeping all the swag. These games do give the Kane & Lynch 2 package additional appeal, but on balance it's still not quite enough to break down genre barriers and make this an essential gaming purchase.

Rating: 3 / 5

Neil Davey

guardian.co.uk ? Guardian News & Media Limited 2010 | Use of this content is subject to our Terms & Conditions| More Feeds





Monitored Alarm Systems
Friday, August 20, 2010

postheadericon Viper 1002 Car Alarm Security System

[[[Viper 1002 Car Alarm Security System]]]



Discription : Viper security system will wrap your vehicle in protection, with the most sophisticated electronic technologies available today, including the Stinger? DoubleGuard? shock sensor, Revenger? six-tone siren and Failsafe? Starter Kill. This state-of-the-art system also offers in-demand convenience feature like keyless entry. Please refer to the technology section for more information about security technologies used in this security system.


More review coming soon.

I purchased this alarm for my truck because it was broken into. I love the two bright blue lights that flash when it is armed. Very happy with it and I recommend this alarm to anyone that wants a little peace of mind when they leave their car alone.

I love this alarm, remote design is cool, and it matches my blue Ford Focus ZX3!!

And of course... is a VIPER!!!





Buy here (at discount) Viper 1002 Car Alarm Security

postheadericon Fire Protection Systems

[[[Fire Protection Systems]]]



Discription : A practical understanding of fire protection systems is essential to effective management of a fire scene. Fire Protection Systems focuses on the operational characteristics and abilities of different types of systems and equipment that are used during fire department operations to access a water source, apply a suppression agent to control a particular type of fire, provide information concerning the location of a fire, and more. Systematic, easy-to-understand coverage thoroughly explores various types of active fire protection systems and components, how they operate, and the requirements for installation, making this a valuable learning tool for firefighters and a handy resource for design professionals.


More review coming soon.









Buy Here (for discount) Fire Protection Systems

Tuesday, August 3, 2010

postheadericon Space station experiences coolant problems

08/02/2010 Space station experiences coolant problems Multiple alarms woke the space station's crew late Saturday after one of two coolant loops shut down, forcing the astronauts to power down critical systems to prevent overheating.


Monitored Alarm Systems
Monday, July 26, 2010

postheadericon Master Locksmithing: An Expert's Guide to Master Keying, Intruder Alarms, Access Control Systems, High-Security Locks...

[[[Master Locksmithing: An Expert's Guide to Master Keying, Intruder Alarms, Access Control Systems, High-Security Locks...]]]



Description:

Boost Your Career Potential with Today's Most Complete Guide to Advanced Locksmithing Skills, Techniques, and Systems!

Turn to Master Locksmithing for clear, nontechnical guidance on the full range of advanced locksmithing skills, techniques, and systems.

Written by the renowned locksmithing author Bill Phillips, this career-building resource provides hard-to-find material on such important topics as masterkeying, intruder alarms, access-control systems, cutting-edge automobile locks, high-security locks, and safe drilling. Packed with at-a-glance information and 120 detailed illustrations, Master Locksmithing features:

  • Expert accounts of all the skills required to become a master locksmith
  • A sample Registered Professional Locksmith Test
  • List of locksmith suppliers, distributors, and monitoring stations have
  • Depth and area charts

Get Everything You Need to Become a Master Locksmith

• Review of Lock Basics • Nonlocking Door Hardware • Rekeying Locks • Reading Wafer Locks • Lock Impressioning • Basics of Lock Picking • Picking High-Security Locks • Automotive Locks and Keys • Safe Basics • Safe Drilling • Masterkeying • Electricity Basics for Locksmiths • Tools for Working with Electricity • Electric Strikes • Electromagnetic Locks • Emergency Exit Devices • Closed-Circuit Television Systems • Intruder Alarms • Access Control Basics • Door Closers • Securing an Office • Door Lock Installation • Automobile Locks • Getting Licensed as a Locksmith • Hiring Locksmiths • Making Your Locksmithing Business More Profitable


More review soon.

This book would be ok for the novice but if you have any experience at all do not expect too much. I grabbed one of these to find the title was misleading. Re-printed info you can find on the web. It would have been better titled beginning locksmithing.

After reading The Complete Book of Locks and Locksmithing, 6th edition, one would think that this book continues the study of locksmithing to a higher level. In fact, it really offers little information at all other than spec sheets from other sources.
For instance, Chapter 18, Drilling and Manipulating Safes is just six pages long. Paragraph 3 says "To learn about safes, read all you can about them, and take classes when you can."
This book was a real letdown. Save your money.

Having read the author's previous works, I looked forward to the release of "Master Locksmithing". Unfortunately after receiving my copy I found that the book lacks depth, with about half of it being nothing more than copies of lock manufacturers product information sheets.



The book lists the author, Bill Phillips, as the president of the International Association of Home Safety and Security Professionals. However attempts to locate this association online only finds a defunct website / domain name.

"Master Locksmithing" offers nothing to anyone with more than a basic understanding of locks and locksmithing. It certainly does NOT provide the information one needs to become a master locksmith.


Disappointing! Lacking in substance and depth.




Buy Here (for discount) Master Locksmithing: An Expert's Guide to Master Keying, Intruder Alarms, Access Control Systems, High-Security Locks...

Tuesday, July 20, 2010

postheadericon Loloโ€�s (perfect moment) alarm clock

07/18/2010 Lolo’s (perfect moment) alarm clock It seems everybody has a different interpretation of the perfect alarm clock. [Loic Royer's] alarm clock is not the loudest, or the smartest, but does have some interesting features. By monitoring several environmental factors like temperature, air quality, humidity, dew point, and your own sleep patterns, this alarm clock can determine the best moment in [...]


Monitored Alarm Systems

postheadericon Design of Special Hazard & Fire Alarm Systems

[[[Design Special hazards and fire alarm systems]]]



Discription : Put the most current guide to the design of state-of-the-art special hazard and fire protection systems in the hands of your students. Using the most up-to-date NFPA standards and reference data, this text guides the student through the steps needed and become competent in inspecting and designing a wide variety of simple and complex systems. With an added emphasis on ethical practice, the student gains respect and understanding for the process of designing these systems. This valuable text is designed to be either a comprehensive stand-alone text for a one-semester overview, or as the ideal companion to the "Design of Water-Based Fire Protection Systems," also by Robert Gagnon, for a comprehensive, two-semester study of the latest innovations in fire protection system design. (Keywords: Fire Protection Systems)


More review soon.

As for his previous work Robert Gagnon have written another very helpful guide to fire suppression systems' understanding. The book is a collection of all those fire suppression systems which are commonly installed in high risk plantation and include accurate description and basic calculation design procedures. Even though I consider the book very valuable, I would have expected greater henphasis on halon alternatives, including design procedures.
For all those who are approching the subject the book represent a must. If you are looking for details, better move on more specific pubblications.







Buy Here (for discount) Design of Special Hazard & Fire Alarm Systems

Friday, July 16, 2010

postheadericon 2 way fm car alarm 4500 feet audio system 2 lcd rem

[[[2 way FM car alarm 4500 feet audiosystem 2 LCD-rem]]]



Discription : This listing is for a brand new & factory sealed very long range 2 way car alarm system with keyless entry . This is made by shark. The model number is shk1500m.

There is a 3 year warranty on this item

2-way FM Car Alarm System / LCD 1500M. Range! 2 LCD Remote!

Autoglow Two-Way FM Vehicle Alarm System

1500M Range! (4500 feet)

Long range Car Alarm

Includes 2 LCD Remotes!

Very Advanced, Sophisticated Car Alarm System

* Compatible with factory security system * Multiple user-programmable features * Visual and Audio alert on remote * Car/alarm status LCD display on remote * Reservation mode and Turbo mode selectable * Valet mode * Anti-carjacking system * Door/Hood/Trunk sensors * Silent arm/disarm/alert * Automatic windows roll-up * Automatic dome light supervision * Remote trunk release * Programmable auxiliary output * Interface of microwave sensor or optional sensor * Smart LED indicator * 115db siren * Remote query function * Ultra-low standby power consumption of remote control * Real-time clock and personal alarm clock of remote control * Keyboard lock and LED backlight


More review coming soon.

the alrm is great but there are 2 major things wrong. first offf it DOSEN'T come with remote start so if you are looking ofr remote start then keep looking. thats false advertizing!!!!! second th instructions are NOT in english. and there is no wiring diagram. so you will have to do a lot of reserch to get all the info that you need to get this installed. i hate that i brought this! i now have to get a remote start.







Buy Here (for discount) 2 way fm car alarm 4500 feet audio system 2 lcd rem

Wednesday, July 14, 2010

postheadericon SVAT GX5201 Wireless Portable Video Monitor with 2.5-Inch LCD & Night Vision Security Camera (Color)

[[[SVAT GX5201 Wireless Portable Video Monitor with 2.5-Inch LCD & Night Vision Security Camera (Color)]]]



Discription : SVAT's easy plug-and-play wireless video surveillance system allows you to monitor everything and anything, at a fraction of the cost of traditional surveillance systems. The GX5201 system has a high resolution 2.5-inch LCD monitor that is loaded with features. The camera has a resolution of 360 TV lines, which provides crystal-clear images. Camera also has built-in audio and voice activation, as well as manually adjustable pan-and-tilt capabilities. The GX5201 is for indoor use, and has the option to be able to connect up to three separate indoor or outdoor cameras. This indoor color camera system is suitable for your everyday needs.


More review coming soon.

Too much interference...only a 14 day return window...the main unit doesn't have a power plug in(have to use batteries). Eats up batteries quickly. Does have good picture when it your are close to the camera unit.

We bought this because of the multi-camera function since we have twins. This is a total waste of money. We had originally ordered the Levana Babyview 20 video monitor but returned it because it doesn't have the ability to connect multiple cameras. Having tried that one out I can tell you that it is a MUCH better product! The sound is much clearer, there is no interference, set up is simple and it actually has a clear picture.
The cons of the SVAT were:

1) It is not the color of '\\', as it is done. I've never seen a bit of color on the screen.
2) There is a ton of interference even when our wireless router was turned off. Rolling lines on the screen accompanied by a clicking sound which is exceptionally obnoxious, especially at night. This happens each time it switches between cameras and each time anything comes near the handheld unit.
3) It does not have a sensor which switches it to night vision. You must switch a tiny little switch on the camera. Imagine trying to do this in the dark if you accidentally forgot to do it before puting baby down for the night.
4) The night vision doesn't work well at all. Compared to the Levana Babyview, it is horrible! The Levana could see all the way across the room and was still clear. This is hardly visible from 2 ft. away. One of the cameras (we ordered an extra one seperately) seemed better than the other.
5) The handheld unit is huge and awkward and made out of a cheap plastic which doesn't seem durable at all.
6) The cameras might be fine once they were mounted, but they are also made out of a cheap, lightweight plastic and won't stay put unless they're mounted in place.
7) The instructions are very confusing. When setting up the channels on the handheld unit, down is 'on' and up is 'off' so it took a while to even figure out how to get a picture out of both cameras.
8) In order to use the handheld unit without the ac adaptor, you have to remove the back cover and take out the batteries.
9) The battery life in the handheld unit was horrible! I think they lasted about 2 hours.
10) Before playing with the 3 channels, this totally blocked our wireless router.

The pros were:
1) Price.
2) Ability to add additional cameras.

All in all, I would definitely spend a little more money and get something that works.

I work in the intelligence field and I got this to monitor my children downstairs while I'm upstairs in my office. For the price and plug-&-view - this is a great product. I have CCTV security system for my residence - but this little gem can be taken anywhere. Plug in while at a hotel - park your car outside your window - and monitor it while you're in your room. It's versatile to say the least. Shop around for the best price. Glad I got it - it has come in handy alot!



Buy Here (for discount) SVAT GX5201 Wireless Portable Video Monitor with 2.5-Inch LCD & Night Vision Security Camera (Color)

Saturday, July 10, 2010

postheadericon Pornography's .xxx factor

This summary is not available. Please click here to view the post.
Wednesday, June 23, 2010

postheadericon โ€�Devuvuzelatorโ€� filters vuvuzela from World Cup coverage

06/22/2010 “Devuvuzelator” filters vuvuzela from World Cup coverage

A fan plays the 'instrument' that has become the sound of the 2010 World Cup - the vuvuzel...

Riddle me this. What sounds like an elephant when all alone, but sounds like a swarm of bees when numbers grow? The answer, as any World Cup aficionado will tell you, is the vuvuzela. A meter long plastic horn that has become synonymous with the 2011 World Cup in South Africa and has had many fans reaching for the mute button on their TV remote controls. The BBC has received so many complaints it is looking at ways to minimize the noise of the so-called instrument. Now researchers at the Centre for Digital Music (C4DM) at Queen Mary, University of London have come up with a "devuvuzelator" that filters out the droning sounds of vuvuzela for anyone watching the World Cup on a computer... Continue Reading "Devuvuzelator" filters vuvuzela from World Cup coverage

Tags:Audio , Broadcast, Filter, Soccer

Articles:
  • Able Planet's Clear Voice VoIP Headset
  • Lotus' patented Active Noise Control technologies poised to make motoring more comfortable
  • Ultimate Ears six driver per ear monitors
  • My Pet Speaker – world's first sound system designed for your pet's sensitive ears
  • The outer ear allows people with hearing impairments to 'to feel the noise'
  • Wireless smoke alarm another no-brainer





Monitored Alarm Systems

About Me