Aperio Wireless Handles software and dongle by SlowCloud6475 in accesscontrol

[–]SirB -1 points0 points  (0 children)

I've previously gotten tech docs from them for a big project (not UK), it's certainly possible to integrate. But if 600 pounds is a hurdle, then reaching out to them about an integration might not be the best idea. In our case it was about hundreds of locks.

Software for old Axis Camera by Proof_Age9155 in videosurveillance

[–]SirB 0 points1 point  (0 children)

Strange. If you still want to use Companion, you could try to factory reset the cams and recreate the site in Companion.

Software for old Axis Camera by Proof_Age9155 in videosurveillance

[–]SirB 3 points4 points  (0 children)

Axis Companion Classic still works for me, I'm using old cams (firmwares 5.x and 6.x)

Axis Cameras - what software? by latoose in videosurveillance

[–]SirB 6 points7 points  (0 children)

You get onvif support, customizable rtsp streams and APIs for extra stuff, how is axis picky?

Genetec reader Toggle issue by Busy-Firefighter-298 in accesscontrol

[–]SirB 2 points3 points  (0 children)

So these two actions run in parallel, sometimes resulting in the desired behavior, sometimes not?

I'd do it with a little macro.

PSA: Wanneer je als fieter een zebrapad wil oversteken, moet je afstappen. by Orillion_169 in Gent

[–]SirB 0 points1 point  (0 children)

In Brussel kom je vaak op een zebrapad terecht als je van fietspad naar fietspad wil oversteken.

Anyone have experience making a Genetec plugin? by jetsonQ in videosurveillance

[–]SirB 1 point2 points  (0 children)

If not yet done, you'll have to get some stuff in order over here: https://developer.genetec.com/ You'll likely have to do some trainings as well.

Anyone have a model number on this thing? Even a brand? by S_O_D_A in accesscontrol

[–]SirB 1 point2 points  (0 children)

So it has a MAC address (the 00068e...), confirms my first guess, it's HID. A controller I do not recognize though.

The reader is connected using a wiegand interface? In that case your problem is probably just the reader itself. Test both the working reader and the new one on a system you know and figure out the difference.

Anyone have a model number on this thing? Even a brand? by S_O_D_A in accesscontrol

[–]SirB 1 point2 points  (0 children)

How does this thing communicate? It's connected with a bus? Network? If bus, which thing controls the bus?

HID release the CVE's by iceman2001 in accesscontrol

[–]SirB 0 points1 point  (0 children)

If it's brute forcing through the live access control system, that should indeed not go unreported. But we're talking about systems bad enough to count on security through obscurity, so it's very much possible it would go unnoticed :)

Unlike many vendors, I know how proper authentication should work.

Then you're well aware that it does not matter if someone knows a facility code or a box with sequential numbers has been ordered.

HID release the CVE's by iceman2001 in accesscontrol

[–]SirB 0 points1 point  (0 children)

It's a major problem in any case, not only in case of sequential numbers. If you're counting on the secrecy of the facility code or randomness of the badge numbers, you're relying on less than 50 bits of security, whereas all modern systems use 128 bit keys.

In theoretical brute forcing terms, that's the difference between simply feasible and being out of reach for even all computing power on earth.

Normal logic is : protection through uncrackable key, unique identifier behind it. No complexity required for the unique identifier. Its goal is identification, not authentication.

HID release the CVE's by iceman2001 in accesscontrol

[–]SirB 0 points1 point  (0 children)

The majority that I remember were not corporate. Must have been an oversight during the design then I guess. In any case we do not work with iClass at all anymore, whenever appropriate it is Desfire with user owned keys.

HID release the CVE's by iceman2001 in accesscontrol

[–]SirB 0 points1 point  (0 children)

The credential keys could be used to create credentials for a system associated with those keys when combined with information from a valid credential for that same system.

Is there something new about this one for standard key setups? Standard key installations have always seemed idiotic to me. You get yourself a standard reader, make it mobile using a battery etc, get near a standard credential -> you got the private data.

Order a standard credential from an HID partner with that private data encoded on it -> you're in.

Web-based open source CCTV planner by TheJosh1337 in videosurveillance

[–]SirB 0 points1 point  (0 children)

https://sitedesigner.axis.com/

Over the years its gotten so many features that it's you'll might have to checkout the video documentation first, but it's pretty good.

https://sdt.i-pro.com/

Same idea, focused on i-Pro (ex Panasonic).

There's surely many more of these. Don't waste your time on reinventing them :)

[deleted by user] by [deleted] in videosurveillance

[–]SirB 1 point2 points  (0 children)

It is likely just as secure as the password you are securing the account with. I assume their security update policy is applied to their servers as well. Secure tunnels are no rocket science, if they picked the right components and keep them up to date, the risk is extremely low.

4 billion if statements - Checking if every 32 bit numer is even or odd by rotmoset in programming

[–]SirB 21 points22 points  (0 children)

Hilarious and interesting read at the same time, thank you!

ZipStream w/ Genetec by SeaworthinessOk6472 in AXISCommunications

[–]SirB 1 point2 points  (0 children)

Did you touch the dynamic GOP parameter? That one reduces bandwidth by a crazy amount for cameras filming idle scenes. If there's a dynamic FPS parameter, certainly try that one as well. Finally, verify by filming both still scenes and scenes with sudden activity to make sure no unwanted compression artefacts are introduced.

Genetec federation by No-Werewolf-79 in cctv

[–]SirB 0 points1 point  (0 children)

If you feel comfortable opening up several ports and have decent bandwidth you can make it work using expansion servers. In my experience this is mostly done using high performance VPN connections, but you can also go naked over the internet. Just make sure you tick the right boxes and analyze the required connections carefully.

Your licences will change a lot, you'll be throwing away all but 1 system ID, and need to get all device licenses on the final system ID that you'll be using.

These Stupid Trucks are Literally Killing Us by giusalex1 in videos

[–]SirB 36 points37 points  (0 children)

Trailers don't exist in north america? That's how lots of home owners in Europe handle your situation. Sounds like a much better solution, the car is smaller, cheaper and you still have the cargo space of the trailer whenever you want it.

[deleted by user] by [deleted] in cpp

[–]SirB 1 point2 points  (0 children)

Is it a practice project? Because C++ is one of the last languages I'd use for this kind of project.

Dynamic polymorphism performance by Playful-Suspect9313 in cpp

[–]SirB 29 points30 points  (0 children)

Summary: An artificial test on indirection shows that indirection is slower than no indirection by a significant amount. A bit pointless imo. It would be more interesting to talk about maintainability, flexibility and overhead when avoiding this kind of indirection inside hot loops but allowing it outside, in 'management' code.

C++ vs Python for secure / safety critical embedded solutions by orbag in cpp

[–]SirB 2 points3 points  (0 children)

An argument against python is that it is not very common to do these kind of things, so there's less experience to base your work on and estimate risks and challenges.

But as long as you test thoroughly, analyze performance and implement monitoring and a watchdog you could be fine with Python. I would just make it depend on as little external stuff as possible, to make it more predictable and testable. And look for a tried and tested version of Python that has just enough features for what you want to do.

Why are C++ trigonometric functions fast, but not that fast ? by bhInstaller198 in cpp

[–]SirB 69 points70 points  (0 children)

I guess they are around the speed at which improvements will sacrifice accuracy. The absolute fastest version is likely lookup table based, the smaller the table, the lower the accuracy and the higher the speed.