Announcement

Collapse
No announcement yet.

Home surveillance system

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Home surveillance system

    We're looking for a security camera system for the house. I want at least 4 cameras that are wired and I would like to have audio on the cameras if possible. I want to spend less then $500-ish. Any recommendations?

    Thanks...

    PS I want a hard drive to record on instead of cloud storage.

    #2
    Originally posted by Scott C4/5 View Post
    We're looking for a security camera system for the house. I want at least 4 cameras that are wired and I would like to have audio on the cameras if possible. I want to spend less then $500-ish. Any recommendations?
    Presumably, you want to record the exterior environs and not stuff inside? Are you content with fixed cameras? Or, do you want/need PTZ capability?

    What sort of image (and audio) fidelity? How far do you want to be able to see "in the dark" (or will you locate each camera near a motion sensor floodlight)?

    How much video (time) do you want to be able to record?

    What are you hoping to capture -- a neighbor's pet "littering" your lawn or a local urchin vandalizing your house?

    Comment


      #3
      Exterior, fixed cameras, 720-1080 video & decent audio, less than 75 feet night vision, and record for 4-7 days. I want to see who and what comes onto my ramp and the houses wrap around porch both day and night. Audio isn't a must but if I can get it without spending a lot I would like it.

      Comment


        #4
        Originally posted by Scott C4/5 View Post
        Exterior, fixed cameras, 720-1080 video & decent audio, less than 75 feet night vision, and record for 4-7 days. I want to see who and what comes onto my ramp and the houses wrap around porch both day and night. Audio isn't a must but if I can get it without spending a lot I would like it.
        If you rely on the infrared (Ir) emitters IN the camera to illuminate the field, you will find 75 feet to be a tall order -- think more along the lines of 20 ft for most (affordable) cameras. Note, also, that many of those cameras will be providing monochrome imagery in "night mode".

        If someone is being surreptitious, you're unlikely to capture any audio from them unless they happen to be right at the camera (microphone).

        In addition to cutting down your storage requirements, you may want to find cameras (or "controller") that implement motion sensing algorithms and only record when they see something "happening". These differ from the motion sensors that are present in "security lights" in that they actually LOOK at the video image and watch for changes in it -- signs that "something has moved". You typically define a region of the image that you want to "watch" so the camera/system can ignore areas that might have motion that is not of interest to you (e.g., if the camera can see traffic driving by your house but YOU aren't really interested in that "activity").

        An advantage of of this capability is the camera/system can alert you to this "activity" -- so you don't have to browse through 24 hours of video to see what's happened in the last 24 hours!

        You may want to spend your money on the cameras instead of on a "system" -- $500/4 gives you a decent budget PER CAMERA; trying to include a "controller" as well means you'll be skimping on cameras (poor video quality, poor reliability). (You can buy cameras for as little as $25 but you may discover you're not happy with their quality or reliability!)

        You can DIY a "system" in a number of ways. How the (wired, in your case) cameras connect to the controller is the key difference among them.

        You can use (USB) "web cams" but these need to be located close to a computer. So, this really only works if all of your cameras are clustered (around a single computer) -- OR, if you can locate small computers (if you know what a raspberry pi is) near each and then push the video stream out over a network connection.

        You can use IP (Internet Protocol) cameras which are essentially cameras with little computers built in (as above) to push the video to a centrally located computer over network connections.

        You can use cameras with conventional (RS170-ish) "video output" cabled (coax) to a controller which has a "video interface" for each camera.

        In each case, the "controller" can just be a PC running "video surveillance" software; the video is then stored on the computer's hard disk.

        You will also have to decide how convenient you want the setup and maintenance of the system to be (money vs. time). E.g., I'm wiring up a small system (3 cameras) next week where much of the "smarts" resides in the cameras (motion detectors) and the "controller" just has to act as a recorder. But, this requires having physical access to the cameras to push the buttons to configure those settings that are IN the camera each time I want to change them (we had several of these lying around which made the decision easier ).

        http://www.specotech.com/index.php/p...m/67-cvc627scs

        For a low end system, you can look at things like Harbor Freight's offering (4 camera "systems" for ~$250) but caveat emptor.

        Ask yourself if you really are looking for an "investment" or just trying to get an general/crude idea of what's going on, outdoors, before you commit to a solution.

        Comment


          #5
          One box solution (choice of dome or standard cameras): https://www.amazon.com/Reolink-Surve.../dp/B016UCNP3A

          Price is around $410 with the regular lightning deals and has lots of positive feedback on both Amazon US & Amazon UK sites.

          Reolink website: https://reolink.com/product/rlk8-410b4/

          The app on my android phone is excellent so I can see the cameras at anytime (using 4G etc). The motion sensing is pretty accurate too so I've set it up to do this rather than continual recording. Pretty cheap cameras and easy to setup using PoE Cat 5 cable.
          Dots, lines and aeroplanes. my flying adventures.

          Comment


            #6
            Originally posted by sarcastrix View Post
            The app on my android phone is excellent so I can see the cameras at anytime (using 4G etc).
            I would seriously "think twice" before enabling any "remote viewing". Doing so means allowing "remote access". That means potentially exposing EVERYTHING on your internal "Intranet" to the outside world -- unless you want to remain forever vigilant (i.e., checking for vulnerabilities that are discovered from hence forward).

            Spend a bit of time with your favorite search engine looking for "vulnerabilities" for your particular make/model before going that route. Also look at the manufacturer's past history, in that regard (it's too easy to reuse portions of previous designs when creating new products and this leads to the same mistakes/vulnerabilities being perpetuated in "new" models)

            Comment


              #7
              Originally posted by automation View Post
              I would seriously "think twice" before enabling any "remote viewing". Doing so means allowing "remote access". That means potentially exposing EVERYTHING on your internal "Intranet" to the outside world -- unless you want to remain forever vigilant (i.e., checking for vulnerabilities that are discovered from hence forward).
              Someone has their silver foil hat on

              If a teenager (or the govt) in China want to "hack" my cameras to watch my driveway or the dog crapping in the garden, they are more than welcome. I'd rather be alerted to someone stealing my cars or breaking into the house when I'm away.
              Dots, lines and aeroplanes. my flying adventures.

              Comment


                #8
                Originally posted by sarcastrix View Post
                Someone has their silver foil hat on

                If a teenager (or the govt) in China want to "hack" my cameras to watch my driveway or the dog crapping in the garden, they are more than welcome. I'd rather be alerted to someone stealing my cars or breaking into the house when I'm away.
                You're thinking incredibly naively. The days of hackerrs just trying to cause mischief for INDIVIDUALS (e.g., by erasing your hard drive or stealing your address book) are decades past.

                No one really gives a damn what goes on in your house -- except google, of course (but for different reasons; they're trying to HELP you! <rolls eyes>)!

                But, your camera(s) -- and other bits of "smart technology" -- are ripe for lending beachheads to malware that can interact with other devices IN YOUR HOUSE (like your PC's). Would you let that chinese hacker sit in your bedroom with full access to your network, indefinitely, patiently and single-mindedly looking for exploits in the other deviecs that you have attached to it?? Why would you let him sit in your CAMERA??

                Also, they can be used to create botnets that then are deployed to attack specific targets (how'd you like to discover that YOUR camera played a role in attacking your BANK?) A worthwhile read: https://www.wired.com/story/reaper-i...lion-networks/

                A bit of time researching how attacks and exploits have been deployed IN THE PAST might cause you to invest in some tinfoil of your own!

                Recall, there's no "antivirus" software for your camera(s), thermostat, etc. And, are you sure their firmware is up-to-date? Even if so, google "zero day exploit" and wonder why YOU will be the lucky soul who is NOT hacked.

                [Hint: I design this sort of stuff for a living. The number of exploits that you don't hear about -- cuz your more interested in football/basketball scores -- is staggering. And, where there's evidence of ONE flaw in a design, there are likely many MORE!]

                From https://www.vdoo.com/blog/working-wi...olink-cameras/:

                Researching the Reolink RLC-410 video surveillance camera, bashis has discovered and disclosed 3 vulnerabilities ? a command injection remote-code execution vulnerability requiring authentication and two stack-overflow vulnerabilities. The vulnerabilities, which appear to be relevant to multiple Reolink camera models, were responsibly disclosed to the vendor.
                From https://github.com/threat9/routersploit/issues/242:

                List of vulnerabilities & exploits

                • Intellinet NFC-30IR Camera - Multiple Vulnerabilities
                  Netwave IP Camera - Password Disclosure
                  Komfy Switch with Camera DKZ-201S/W - WiFi Password Disclosure
                • AVTECH IP Camera, NVR, and DVR Devices - Multiple Vulnerabilities
                  VideoIQ Camera - Local File Disclosure
                  Vanderbilt IP-Camera CCPW3025-IR / CVMW3025-IR - Local File Disclosure
                • JVC IP-Camera VN-T216VPRU - Local File Disclosure
                  Honeywell IP-Camera HICC-1100PT - Local File Disclosure
                • MESSOA IP-Camera NIC990 - Authentication Bypass / Configuration Download
                  SIEMENS IP Cameras (Multiple Models) - Credential Disclosure / Configuration Download
                • Vanderbilt IP-Camera CCPW3025-IR / CVMW3025-IR - Credentials Disclosure
                  MESSOA IP Cameras (Multiple Models) - Unauthenticated Password Change
                • JVC IP-Camera VN-T216VPRU - Credentials Disclosure
                  TOSHIBA IP-Camera IK-WP41A - Authentication Bypass / Configuration Download
                • Honeywell IP-Camera HICC-1100PT - Credentials Disclosure
                  SIEMENS IP Camera CCMW1025 x.2.2.1798 - Remote Admin Credentials Change
                • SIEMENS IP-Camera CVMS2025-IR / CCMS2025 - Credentials Disclosure
                  Samsung Smart Home Camera SNH-P-6410 - Command Injection
                • Multiple JVC HDRs and Net Cameras - Multiple Vulnerabilities
                  Merit Lilin IP Cameras - Multiple Vulnerabilities
                • TH692 Outdoor P2P HD Waterproof IP Camera - Hard-Coded Credentials
                  Brickcom Corporation Network Cameras - Multiple Vulnerabilities
                • Axis Network Cameras - Multiple Vulnerabilities
                  PLANET Technology IP Surveillance Cameras - Multiple Vulnerabilities
                • ADH-Web Server IP-Cameras - Multiple Vulnerabilities
                  TP-Link NC200/NC220 Cloud Camera 300Mbps Wi-Fi - Hard-Coded Credentials
                • Keeper IP Camera 3.2.2.10 - Authentication Bypass
                  Security IP Camera Star Vision DVR - Authentication Bypass
                • IPUX CS7522/CS2330/CS2030 IP Camera - 'UltraHVCamX.ocx' ActiveX Stack Buffer Overflow
                  IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow
                • IPUX CL5452/CL5132 IP Camera - 'UltraSVCamX.ocx' ActiveX Stack Buffer Overflow
                  TRENDnet SecurView Wireless Network Camera TV-IP422WN - 'UltraCamX.ocx' Stack Buffer Overflow
                • Foscam IP Camera - Predictable Credentials Security Bypass
                  Vivotek IP Cameras - RTSP Authentication Bypass
                • Loftek Nexus 543 IP Cameras - Multiple Vulnerabilities
                  Hikvision IP Cameras 4.1.0 b130111 - Multiple Vulnerabilities
                • TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities
                  FOSCAM IP-Cameras - Improper Access Restrictions
                • Airlive IP Cameras - Multiple Vulnerabilities
                  MayGion IP Cameras Firmware 09.27 - Multiple Vulnerabilities
                • Zavio IP Cameras Firmware 1.6.03 - Multiple Vulnerabilities
                  Security IP Camera Star Vision DVR - Authentication Bypass
                • IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow
                  IPUX CL5452/CL5132 IP Camera - 'UltraSVCamX.ocx' ActiveX Stack Buffer Overflow
                • IPUX CS7522/CS2330/CS2030 IP Camera - 'UltraHVCamX.ocx' ActiveX Stack Buffer Overflow
                  TRENDnet SecurView Wireless Network Camera TV-IP422WN - 'UltraCamX.ocx' Stack Buffer Overflow
                • Foscam IP Camera - Predictable Credentials Security Bypass
                  Vivotek IP Cameras - RTSP Authentication Bypass
                • Loftek Nexus 543 IP Cameras - Multiple Vulnerabilities
                  Hikvision IP Cameras 4.1.0 b130111 - Multiple Vulnerabilities
                • TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities
                  FOSCAM IP-Cameras - Improper Access Restrictions
                • Airlive IP Cameras - Multiple Vulnerabilities
                  TP-Link IP Cameras Firmware 1.6.18P12 - Multiple Vulnerabilities
                • D-Link IP Cameras - Multiple Vulnerabilities
                  StarVedia IPCamera IC502w IC502w+ v020313 - 'Username'/Password Disclosure
                • D-Link DCS Cameras - Multiple Vulnerabilities
                  Vivotek Cameras - Sensitive Information Disclosure
                • TRENDnet SecurView Internet Camera - UltraMJCam OpenFileDlg Buffer Overflow (Metasploit)
                  TRENDnet SecurView TV-IP121WN Wireless Internet Camera - UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow
                • Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera PlayerPT - ActiveX Control PlayerPT.ocx sprintf Buffer Overflow
                  Multiple Trendnet Camera Products - Remote Security Bypass
                • RXS-3211 IP Camera - UDP Packet Password Information Disclosure
                  Camtron CMNC-200 IP Camera - Authentication Bypass
                • Camtron CMNC-200 IP Camera - Undocumented Default Accounts
                  Camtron CMNC-200 IP Camera - ActiveX Buffer Overflow
                • Camtron CMNC-200 IP Camera - Directory Traversal
                  Intellinet IP Camera MNC-L10 - Authentication Bypass
                • ARD-9808 DVR Card Security Camera - Arbitrary Config Disclosure
                  Camera Life 2.6.2b4 - Arbitrary File Upload
                • Camera Life 2.6.2 - 'id' Parameter SQL Injection
                  AXIS Camera Control (AxisCamControl.ocx 1.0.2.15) - Buffer Overflow
                • Sony Network Camera SNC-P5 1.0 - ActiveX viewer Heap Overflow (PoC)
                  D-Link DCS-900 Camera - Remote IP Address Changer Exploit
                • Axis Network Camera 2.x And Video Server 1-3 - virtualinput.cgi Arbitrary Command Execution
                  Axis Network Camera 2.x And Video Server 1-3 - Directory Traversal
                • Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass
                  Linksys Web Camera Software 2.10 - Next_file Parameter File Disclosure
                • Axis Network Camera 2.x - HTTP Authentication Bypass


                If you're more technically inclined https://jumpespjump.blogspot.com/201...and-found.html:
                Last edited by automation; 12 Mar 2019, 1:34 PM.

                Comment


                  #9
                  You really need to get out more instead of cutting and pasting stuff from Google.
                  Dots, lines and aeroplanes. my flying adventures.

                  Comment


                    #10
                    Originally posted by sarcastrix View Post
                    You really need to get out more instead of cutting and pasting stuff from Google.
                    Gotta congratulate you on the quality of your counter-argument! (google "ad hominem")

                    Comment


                      #11
                      Originally posted by automation View Post
                      You're thinking incredibly naively. The days of hackerrs just trying to cause mischief for INDIVIDUALS (e.g., by erasing your hard drive or stealing your address book) are decades past.

                      No one really gives a damn what goes on in your house -- except google, of course (but for different reasons; they're trying to HELP you! <rolls eyes>)!

                      But, your camera(s) -- and other bits of "smart technology" -- are ripe for lending beachheads to malware that can interact with other devices IN YOUR HOUSE (like your PC's). Would you let that chinese hacker sit in your bedroom with full access to your network, indefinitely, patiently and single-mindedly looking for exploits in the other deviecs that you have attached to it?? Why would you let him sit in your CAMERA??

                      Also, they can be used to create botnets that then are deployed to attack specific targets (how'd you like to discover that YOUR camera played a role in attacking your BANK?) A worthwhile read: https://www.wired.com/story/reaper-i...lion-networks/

                      A bit of time researching how attacks and exploits have been deployed IN THE PAST might cause you to invest in some tinfoil of your own!

                      Recall, there's no "antivirus" software for your camera(s), thermostat, etc. And, are you sure their firmware is up-to-date? Even if so, google "zero day exploit" and wonder why YOU will be the lucky soul who is NOT hacked.

                      [Hint: I design this sort of stuff for a living. The number of exploits that you don't hear about -- cuz your more interested in football/basketball scores -- is staggering. And, where there's evidence of ONE flaw in a design, there are likely many MORE!]

                      From https://www.vdoo.com/blog/working-wi...olink-cameras/:



                      From https://github.com/threat9/routersploit/issues/242:

                      List of vulnerabilities & exploits

                      • Intellinet NFC-30IR Camera - Multiple Vulnerabilities
                        Netwave IP Camera - Password Disclosure
                        Komfy Switch with Camera DKZ-201S/W - WiFi Password Disclosure
                      • AVTECH IP Camera, NVR, and DVR Devices - Multiple Vulnerabilities
                        VideoIQ Camera - Local File Disclosure
                        Vanderbilt IP-Camera CCPW3025-IR / CVMW3025-IR - Local File Disclosure
                      • JVC IP-Camera VN-T216VPRU - Local File Disclosure
                        Honeywell IP-Camera HICC-1100PT - Local File Disclosure
                      • MESSOA IP-Camera NIC990 - Authentication Bypass / Configuration Download
                        SIEMENS IP Cameras (Multiple Models) - Credential Disclosure / Configuration Download
                      • Vanderbilt IP-Camera CCPW3025-IR / CVMW3025-IR - Credentials Disclosure
                        MESSOA IP Cameras (Multiple Models) - Unauthenticated Password Change
                      • JVC IP-Camera VN-T216VPRU - Credentials Disclosure
                        TOSHIBA IP-Camera IK-WP41A - Authentication Bypass / Configuration Download
                      • Honeywell IP-Camera HICC-1100PT - Credentials Disclosure
                        SIEMENS IP Camera CCMW1025 x.2.2.1798 - Remote Admin Credentials Change
                      • SIEMENS IP-Camera CVMS2025-IR / CCMS2025 - Credentials Disclosure
                        Samsung Smart Home Camera SNH-P-6410 - Command Injection
                      • Multiple JVC HDRs and Net Cameras - Multiple Vulnerabilities
                        Merit Lilin IP Cameras - Multiple Vulnerabilities
                      • TH692 Outdoor P2P HD Waterproof IP Camera - Hard-Coded Credentials
                        Brickcom Corporation Network Cameras - Multiple Vulnerabilities
                      • Axis Network Cameras - Multiple Vulnerabilities
                        PLANET Technology IP Surveillance Cameras - Multiple Vulnerabilities
                      • ADH-Web Server IP-Cameras - Multiple Vulnerabilities
                        TP-Link NC200/NC220 Cloud Camera 300Mbps Wi-Fi - Hard-Coded Credentials
                      • Keeper IP Camera 3.2.2.10 - Authentication Bypass
                        Security IP Camera Star Vision DVR - Authentication Bypass
                      • IPUX CS7522/CS2330/CS2030 IP Camera - 'UltraHVCamX.ocx' ActiveX Stack Buffer Overflow
                        IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow
                      • IPUX CL5452/CL5132 IP Camera - 'UltraSVCamX.ocx' ActiveX Stack Buffer Overflow
                        TRENDnet SecurView Wireless Network Camera TV-IP422WN - 'UltraCamX.ocx' Stack Buffer Overflow
                      • Foscam IP Camera - Predictable Credentials Security Bypass
                        Vivotek IP Cameras - RTSP Authentication Bypass
                      • Loftek Nexus 543 IP Cameras - Multiple Vulnerabilities
                        Hikvision IP Cameras 4.1.0 b130111 - Multiple Vulnerabilities
                      • TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities
                        FOSCAM IP-Cameras - Improper Access Restrictions
                      • Airlive IP Cameras - Multiple Vulnerabilities
                        MayGion IP Cameras Firmware 09.27 - Multiple Vulnerabilities
                      • Zavio IP Cameras Firmware 1.6.03 - Multiple Vulnerabilities
                        Security IP Camera Star Vision DVR - Authentication Bypass
                      • IPUX Cube Type CS303C IP Camera - 'UltraMJCamX.ocx' ActiveX Stack Buffer Overflow
                        IPUX CL5452/CL5132 IP Camera - 'UltraSVCamX.ocx' ActiveX Stack Buffer Overflow
                      • IPUX CS7522/CS2330/CS2030 IP Camera - 'UltraHVCamX.ocx' ActiveX Stack Buffer Overflow
                        TRENDnet SecurView Wireless Network Camera TV-IP422WN - 'UltraCamX.ocx' Stack Buffer Overflow
                      • Foscam IP Camera - Predictable Credentials Security Bypass
                        Vivotek IP Cameras - RTSP Authentication Bypass
                      • Loftek Nexus 543 IP Cameras - Multiple Vulnerabilities
                        Hikvision IP Cameras 4.1.0 b130111 - Multiple Vulnerabilities
                      • TP-Link TL-SC3171 IP Cameras - Multiple Vulnerabilities
                        FOSCAM IP-Cameras - Improper Access Restrictions
                      • Airlive IP Cameras - Multiple Vulnerabilities
                        TP-Link IP Cameras Firmware 1.6.18P12 - Multiple Vulnerabilities
                      • D-Link IP Cameras - Multiple Vulnerabilities
                        StarVedia IPCamera IC502w IC502w+ v020313 - 'Username'/Password Disclosure
                      • D-Link DCS Cameras - Multiple Vulnerabilities
                        Vivotek Cameras - Sensitive Information Disclosure
                      • TRENDnet SecurView Internet Camera - UltraMJCam OpenFileDlg Buffer Overflow (Metasploit)
                        TRENDnet SecurView TV-IP121WN Wireless Internet Camera - UltraMJCam ActiveX Control OpenFileDlg WideCharToMultiByte Remote Stack Buffer Overflow
                      • Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera PlayerPT - ActiveX Control PlayerPT.ocx sprintf Buffer Overflow
                        Multiple Trendnet Camera Products - Remote Security Bypass
                      • RXS-3211 IP Camera - UDP Packet Password Information Disclosure
                        Camtron CMNC-200 IP Camera - Authentication Bypass
                      • Camtron CMNC-200 IP Camera - Undocumented Default Accounts
                        Camtron CMNC-200 IP Camera - ActiveX Buffer Overflow
                      • Camtron CMNC-200 IP Camera - Directory Traversal
                        Intellinet IP Camera MNC-L10 - Authentication Bypass
                      • ARD-9808 DVR Card Security Camera - Arbitrary Config Disclosure
                        Camera Life 2.6.2b4 - Arbitrary File Upload
                      • Camera Life 2.6.2 - 'id' Parameter SQL Injection
                        AXIS Camera Control (AxisCamControl.ocx 1.0.2.15) - Buffer Overflow
                      • Sony Network Camera SNC-P5 1.0 - ActiveX viewer Heap Overflow (PoC)
                        D-Link DCS-900 Camera - Remote IP Address Changer Exploit
                      • Axis Network Camera 2.x And Video Server 1-3 - virtualinput.cgi Arbitrary Command Execution
                        Axis Network Camera 2.x And Video Server 1-3 - Directory Traversal
                      • Axis Network Camera 2.x And Video Server 1-3 - HTTP Authentication Bypass
                        Linksys Web Camera Software 2.10 - Next_file Parameter File Disclosure
                      • Axis Network Camera 2.x - HTTP Authentication Bypass


                      If you're more technically inclined https://jumpespjump.blogspot.com/201...and-found.html:

                      That kind of thinking really holds people back.

                      Anything tied to the internet can be hacked just change the default passwords and move on.

                      We have cameras, security systems, phones, tablets, computers, nest, refrigerators, the list goes on and on and our life is fine and very accessible now with technology!

                      Comment


                        #12
                        Originally posted by Scott C4/5 View Post
                        We're looking for a security camera system for the house. I want at least 4 cameras that are wired and I would like to have audio on the cameras if possible. I want to spend less then $500-ish. Any recommendations?

                        Thanks...



                        PS I want a hard drive to record on instead of cloud storage.

                        Hardwire is really dating the system go wifi and keep it simple and more cost effective.

                        Keep with majors like Ring simple HD and now 4k options you can add memory cards the units or store on the clould. or do both.

                        As your needs change you can add more cameras or remove them.

                        We have ours set to trigger us when someone gets near our property.

                        You can listen and talk back with crystal clear!

                        Comment


                          #13
                          Originally posted by RollPositive View Post
                          That kind of thinking really holds people back.
                          No, that kind of thinking saves people the aggravation of having their HOUSEHOLD hacked!

                          You have some number of wireless devices (in this case, cameras) tie to your wireless router which is also tied to your computer(s). In addition to any other wired/wireless cruft in your home. There is no "firewall" in the air between the wireless devices and an adversary. No way to keep him out beyond the encryption that the wireless devices use. And, this keeps CHANGING with each passing year (because exploits are uncovered that expose weaknesses in the earlier "standards" -- WEP? WPA? WPA2? When does AES fall??).

                          And, once "inside" your (firewalled!?) network, an adversary's software can sit, patiently, probing for flaws in the other devices connected to that wireless network -- including those WIRED devices connected at your router! Because he's "inside", your firewall can't keep him out. Nor can it prevent him from contacting The Mothership for instructions as to which attacks should be tried next (nor from reporting his success/failure with previous attacks).

                          Of course, you probably do your online banking, billpay and ecommerce using one of those computers so that malware can poke at your computer until it's managed to find a way in and lift your bank account #, password, etc.

                          Why have a firewall on your router if there's a way AROUND it?

                          Anything tied to the internet can be hacked just change the default passwords and move on.
                          Any car can be stolen! So, why INCONVENIENCE yourself by carrying keys and fumbling to lock/unlock the doors when you could just leave the car UNLOCKED? (!)

                          "Default passwords" are low-hanging fruit. Hacks involve more than just probing for devices where the user has been too lazy/naive/inept to bother changing passwords from their factory defaults.

                          List all of the devices that you have connected to your network -- doorcam, thermostat, smart TV, router, PCs, etc. Then, note the most recent time you installed any software updates for that device. Then, see if there are even updates AVAILABLE for it! (do you really think that a device for which updates are unavailable is "bug free"? Or, that any bugs are solely unrelated to security aspects of its operation?)

                          I'm installing a security camera setup at a local business this coming week. The cameras are wired to the DVR (which runs 24/7/365). The DVR "talks" to one PC -- but not to the outside world. Similarly, there is no way for the outside world to talk to (i.e., HACK) the DVR. Because I know the DVR software will soon be "no longer supported" -- which means any exploits discovered in the future will be impossible to fix (unless they publish the source code for the DVR itself). By isolating the device from any potential sources of exploits, I eliminate that possibility (because I don't want to make a career out of keeping folks' DVRs up-to-date!)

                          Here's a "random" webcam: https://www.shodan.io/host/218.147.109.62 Note that the search engine not only FOUND the webcam but probed it to determine what software was CURRENTLY running on/in the device. THEN, consulted the PUBLICLY AVAILABLE list of exploits and determined which of those would apply to this particular device (listed in the lower left as CVE-....). So, if I have a means of tickling one of those exploits, this is a good candidate for me to take a poke at!

                          We have cameras, security systems, phones, tablets, computers, nest, refrigerators, the list goes on and on and our life is fine and very accessible now with technology!
                          In your lifetime, you'll never have the amount of automation (note my choice of username!) that I've installed, here. But, NONE of it is hackable. No, not "99.937%"... NONE! Because security was far more important to me than "convenience". No wireless devices (4000+ ft of cable, instead, for the 100+ devices). No internet access (instead, it's accessed over the PHONE -- far more convenient and far less damage that can be done through that "small pipe"... try downloading software through a voice connection that PROHIBITS software downloads!). No "foreign" computers (try plugging in your laptop to one of my network jacks and you'll find you can't "talk" to anything!).

                          Had I valued convenience, instead, I'd not bother to put any effort -- nor money -- into security.

                          Cars moved from using REAL keys to wireless keyfobs (with "push to unlock") to keyfobs that save you the grueling task of pushing that little button -- just grab the door handle and the door opens, magically! CONVENIENCE!

                          OTOH, I can buy a little "radio" that I conceal in my hand, or pocket. When I see you leaving your vehicle, I'll quickly walk to follow you into the store, getting reasonably close to your person. Close enough for my radio to hear YOUR keyfob's chirps. Meanwhile, my buddy will be standing right alongside your driver-side door with the mate to MY radio in his pocket -- close enough so your car can hear whatever it "says". Of course, it will SAY whatever the radio in my pocket RELAYS to it! So, when HE grabs the door handle, your car will think that YOU are standing beside it and dutifully unlock the door. And, likewise, start the engine when my buddy presses the START ENGINE button.

                          "Duh, who would design such a stupid system??" :> (Well, we didn't expect CAR THEIVES to use off-the-shelf technology in that way!)

                          Similar stories re: overriding a vehicle's controls while it is being driven, remotely reprogramming pacemakers, interfering with the flight systems on aircraft, etc. In each case, because the designers opted for convenience over security (does the car stereo REALLY need to be able to "talk" to the door locks? BRAKES????)

                          With your attitude, it's only a matter of time before you're hacked. And, then, of course, it will be someone else's fault (the vendor for selling a crappy product... or, not bothering to release updates to its software after a 2 year lifespan -- you DO plan on replacing your devices when that happens, right?).

                          [BTW, where did you say you parked your (unlocked) car??]

                          Comment


                            #14
                            Originally posted by RollPositive View Post
                            Keep with majors like Ring simple HD and now 4k options you can add memory cards the units or store on the clould. or do both.
                            From https://www.digitaltrends.com/home/r...ity-flaw-hack/

                            ?Ring is a well-respected IoT brand, however, the vulnerability we discovered in the Ring video doorbell reveals even highly secure devices are vulnerable to attack,?

                            And another:

                            https://www.iotforall.com/huge-vulne...ring-doorbell/

                            and yet another, completely different approach:

                            https://www.cnet.com/news/rings-smar...able-to-hacks/

                            [Feel free to spend some time googling for "ring product vulnerabilities" -- or, any other make/model you choose!]

                            As your needs change you can add more cameras or remove them.

                            We have ours set to trigger us when someone gets near our property.

                            You can listen and talk back with crystal clear!
                            None of this requires a wireless connection! Does your doorbell turn off the lawn sprinklers when it sees someone walking up the front sidewalk? Or, "tell" the delivery person to please leave the package with the neighbor next door, in your absence? (Does it even know when you're "absent"??) Or, tell the neighbor next door that a package has been delivered??

                            I guess those MISSING capabilities must date your wireless implementation, eh? :>

                            Comment


                              #15
                              The readers of this topic would do well to give due consideration to what "automation" has presented in this thread prior to this little suggestion.
                              This kind suggestion is offered by a degreed engineer, computer programmer (including microcode, assembly, and high level languages), and technologist who neither knows nor has met "automation."

                              Comment

                              Working...
                              X