ACCESSING YOUR CAMERA FROM THE INTERNET | IP Camera Network

By ipcamnetwork

One of the biggest benefits of having IP cameras is being able to access them from the internet. Many of us have smartphones, iPads or netbooks that we take with us and it would be great to check in on the place, a pet or the elderly while at work, in a coffee shop or while traveling. Some cameras have 2 way audio, so you can even talk to the person or pet.

The problem many of us have is how do we do it. We all know that if we go to a certain IP address on our home browser, we can configure and view the camera, but how do we do the very same thing when we are not home.

via ACCESSING YOUR CAMERA FROM THE INTERNET | IP Camera Network.

Share

Ohio schools can’t use barricades to keep gunmen out

By Eric Lyttle The Columbus Dispatch  •  Friday February 27, 2015 4:41 AM

Erin West, the mother of a Pataskala 7-year-old, said she is sickened by the thought of more than 300 donated door-security barricades remaining boxed up inside the five buildings of the Southwest Licking school district.

via Today’s Headlines: Ohio schools can’t use barricades to keep gunmen out

Share

Holy Shift! Perceptiv’s drone upgrade kit lets you add auto-follow – CNET

February 25, 2015 11:37 AM PST
by
@ByJoshG

Having auto-follow capabilities on a drone means that it can chase after a subject without assistance from a pilot, essentially giving you your own private flying camera operator. We saw it featured a lot at CES 2015, but in its current state, it doesn’t allow for a lot of creative control — something Perceptiv Labs aims to solve with its Shift kit.

via Holy Shift! Perceptiv’s drone upgrade kit lets you add auto-follow – CNET.

Share

Prevent your Mac password from being bypassed – CNET

February 21, 2015 6:00 AM PST
by
@themattelliott

A nefarious individual could purloin your Mac and bypass your user account password in order to access your data or wipe your system clean and begin using it as their own. It’s possible to reset a password by booting into Recovery Mode or from an external drive.

via Prevent your Mac password from being bypassed – CNET.

Share

Lenovo’s Chief Technology Officer Discusses the Superfish Adware Fiasco – NYTimes.com

By Nicole Perlroth

Lenovo claims it eradicated all traces of Superfish and Komodia from its systems last week, but customers and security researchers say that is not enough. Many have asked why anyone would trust the company in the future.

via Lenovo’s Chief Technology Officer Discusses the Superfish Adware Fiasco – NYTimes.com.

Share

F.C.C. Net Neutrality Rules Shed Hurdle as Republicans Concede to Obama – NYTimes.com

The F.C.C. plan would let the agency regulate Internet access as if it is a public good. It would follow the concept known as net neutrality or an open Internet, banning so-called paid prioritization — or fast lanes — for willing Internet content providers.

via F.C.C. Net Neutrality Rules Shed Hurdle as Republicans Concede to Obama – NYTimes.com.

Share

Most security threats to business well-known, says HP report

Warwick Ashford
Security Editor
23 Feb 2015 13:45

As much as 44% of known breaches in 2014 came from vulnerabilities that are between two and four years old, showing that attackers continue to use well-known techniques to compromise systems and networks.The report identified misconfigurations of servers as the top vulnerability in 2014, providing attackers with unnecessary access to files that leave organisations vulnerable to attack.

via Most security threats to business well-known, says HP report.

Share