What Is Access Control System

Access Control SystemEntrance access control security management system is a new modern safety management system, which combines computer automatic identification technology and modern safety measures as a whole, it involves a lot of new technologies in electronics, machinery, optics, computerte chnology, communications technology, biotechnology and so on. It is aneffective measure to solve the entrance implement security management for importantsectors. For a variety of confidential sectors, such as banks, hotels, parkinglots management, computer room, armory, confidential room, office, intelligence community, factories and so on.

Access control system goes beyond the meredoorway and key management, it has evolved into a complete access controlsystem. It plays a larger role in a safe working environment, personnelattendance management and other administrative work.

Access control system categories

There are different types of access controlsystems according to different classifications

a. According to the designprinciple

1, the controller comes with a card reader (identification device)

This design flaw is the controls shall beinstalled outside at the door, some of the control lines must be exposed to the outside, insiders do not need cards or password can easily open the door.

2, controller and card reader (identification device) Split

Such a system controller installed in the room, only a card reader input lines exposed outdoors, and all other controllines are in the room, and the card reader is transmitted digital signal,therefore, If no effective valid card or password no one can enter. Such systems should be the user’s choice.

b. Classification of communication way

1. Stand-alone control type:

These products are the most common for small system or the centralized installation location unit. Usually use RS485 communication. The advantage is that small investment, dedicated communication lines. The disadvantage is that once installed, it can not easily change the position of the center of management, not easy to achieve network control andremote control.

2. Network type:

Such high-tech products, but also rare,only a few companies molding. It uses a commonly network communication TCP / IP protocol. Advantages of such a system is the controller and the management center via LAN to transfer the data, the management center position can be changed at any time, without re-wiring, easy to implement network control orremote control. Suitable for large system or geographically dispersed units. Disadvantages of such systems are part of the communications system stability rely on the stability of the local area network.

C. By means of identification

1. Password identification

Password verification: identified outprivileges by checking a password.

Password keyboard – These products are divided into two categories: one is ordinary type, one is out of order Keypad(numbers on the keypad is not fixed, from time to time changes automatically).

Normal type – Advantages: easy to operate,no need to carry a card; low cost. Disadvantages: only accommodate three passwordswhile easily leak, security is poor; no access to records; only one-waycontrol.

Shuffle Keypad (numbers on the keypad isnot fixed, from time to time changes automatically) – Advantages: easy to operate, no need to carry the card, the safety factor is slightly higher. Disadvantages: easy password leak, security is not high; no access to records; only one-way control. high cost.

2. Card identification (card reader)

Card identification: to identify the access privileges by reading the card or card with a password mode, according to thetype of cards is divided into magnetic card and RF card.

Magnetic card – Advantages: low cost; oneperson one card (+ PIN), security in general, could be linked computer, thereare open records. Disadvantages: cards, equipment wear and tear, shorter life expectancy; card easily copied; not easy bi-directional control. Card information vulnerable to external magnetic field, so that the card is invalid.

RF card – Advantages: cards, contactless device, convenient and safe to open the door; long life, the oretical data atleast ten years; safe, could be linked computer, there are open records; can achieve bi-directional control. Card difficult to be copied. Disadvantages:high cost.

3. Biometrics identification

Biometrics: Biometric by inspectors and other ways to identify entry and exit. Such as fingerprint, hand geometry type,iris pattern, facial recognition type, as well as finger vein recognition type. Pros: From the perspective of identifying excellent safety; no need to bring the card. Disadvantages: high cost. Recognition rate is not high, high environmental requirements, for users requiring high (such as a fingerprint cannot be scratched, swollen eyes are not bleeding, his face can not have hurt, or how much beard), inconvenient to use (such as facial recognition and iris type, installed certain height, but the user’s height different).

Access control components

a. Access Controller

The core of the access control system, the equivalent of a computer CPU, which is responsible for the entire system input,output and storage of information processing, control, etc.

Card reader (identification device) – Such as (Kiosk card reader SK-288-K001)

Reading card data (biometric information) devices.

b. Electric Lock

Lock the door – the execution unit of access control system. Users should be based on the material of the door, out requirements needs to select different locks. There are the following types:

(1) Electromagnetic lock: electromagnetic lock is to open the door after power off, meet fire safety requirements. And equipped with a variety of mounts for customers to use. This lock is suitable for one-way doors, glass doors, fire doors, folio electric door.

(2) Anode lock: anode is to open the door afterpower off, meet fire safety requirements. It is installed in the upper door frame. The difference from the electromagnetic lock is that anode lock issuitable for two-way doors, glass doors, fire doors, and it itself has magnetic door detector can detect the security status of the door at any time.

(3) Cathode lock: Usually cathode lock is to open the door when energized. Applicable one-way doors. Cathode lock installation must be equipped with UPS. Because when power off the cathode lockis to lock the door.

c. Card

The key to the door. You can print the cardholder’s personal photos on the card, combine the door card and badge.

Other equipments

Exit button: Click to open the door appliance, suitable for the situation to go out unlimited.

Magnetic: Used to detect the door safety/switch state, etc.

Power: the entire system power supply equipment, divided into ordinary type and backup (with battery).

Working Principles

Card reader reading a smart card information(card number) of a cardholder, and then convert to an electrical signal to the access controller, the controller according to the received card number, the cardholder is determined by whether the software over this period can beauthorized to enter the door, according to the result of the determination tocomplete the unlock, remain blocked, etc. . For networked access control system, controller also accepts personnel information transmitted from the management computer, and corresponding authorization information while transmitting card recording information to your computer. A single controller can be composed of a simple access control system, used to manage one or two doors. A plurality of controllers are connected to form the entire building access control system via a communication network with computers. Computer with access control systems management software, which manages all system information analysis and processing.

How To Know About Children Activity Online Using Serial Loggers

How To Know About Children Activity Online Using Serial LoggersDo you have a need to monitor one of your computers? Are you worried about an employee’s work activities or perhaps you want to be very sure about who your child is talking to online? If you are wondering about the best way to find out this information then keyloggers could be an easy answer for you.

There are a couple of options so read on for the reasons we think you should choose a hardware keylogger over a software keylogger.

Hardware keyloggers are super simple to install. They just need to be plugged into the computer between the tower and the keyboard. There are internal options as well if you think the computer user may know what a keylogger is if they see it. There is no other access to the computer required, just the ability for a quick plug in. If you were to choose the software option, you would need to have access to the computer’s password to be able to complete the install.

There is no way to detect a hardware keylogger. It won’t slow don’t the computer when it is being used; it simply records the keystrokes and stores them in its own internal menu. Savvy tech users could discover a software option if it was installed. With this option sometimes the software installed will even show up on the start menu or the task manager! Not the best way for it to remain undetected. Imagine that your anti-virus software runs its usual safety checks and alerts the user to the keylogger you’ve installed! Again – not how you want this to work for you.

Following on from the previous point, hardware keyloggers do not affect the stability of the computer they are installed on. They don’t use the computer’s internal memory to complete their logging of the keystrokes and therefore will not create any type of lag on the computer they are installed on. This is especially good if the computer is a little bit older and starting to slow down anyway.

Something particularly advantageous about a hardware keylogger is its ability to record the keystrokes before the computer is actually up and running. You know all those passwords that are typed in when you first start up a computer, before your operating system has booted up? This type of keylogger will have a record of those keystrokes where the software option would not start recording until the computer was completely turned on and the OS in service. This is a big plus.

Your hardware keylogger will be able to work with just about any operating system. This makes it a great choice if you plan to use it to monitor multiple computers over time.

If you’re looking for a simple solution that doesn’t require you to be too tech savvy, then a hardware keylogger could be just what you need to monitor your home or business computers.

Lenovo Thinkpad T61 Laptop Reviews

Lenovo Thinkpad T6114-inch widescreen ThinkPad T61 widescreen is very similar with the past ThinkPad T60, there is almost no difference between them from the appearance. Only a few small details (such as the body of the Logo) has changed, but the most important change is internal body changes, where we observed the naked eye.

In the bottom right of the ThinkPad logo, is the screen lock and open key; at the center-right, are 3.5mm microphone and headphone jacks; on the left a little green organs, which control the entire ThinkPad wireless resource on / off, including Bluetooth and WiFi; the far left is the IEEE 1394 small jack.

ThinkPad except for one type of removable CD/DVD ROM drive, on the right side of drive is a USB 2.0 port.

Far left is the cooling fins; then is a VGA video output port; then is the RJ-11, RJ-45 ports, two USB slots, and a PCMCIA expansion slot + SD card reader total structural design.

Although the ThinkPad T61 is a dual-core model, the operating system is also equipped with Vista Business, but not with the new PCMCIA Express expansion slot specifications, it uses the old PCMCIA. Also in the bottom PCMCIA slot, there is another SD card reader.

For today SD, mini SD, micro – SD flood situation, this is quite practical.

After remove the battery for T61, the back is actually very simple, there were only two power supply hole and heat dissipation fin two parts.

In addition to the bottom vents scattered throughout, there are user replaceable components are available, such as RAM, hard disk … and so on, have been reserved space and a good mark.

Due to use 9 cell battery, so behind the fuselage will highlight a piece.

Although the battery combined with the body, there is a slot to hold it, but still remember to lock the battery to wear, so as not to loose causing power outages.

At the same position with the cover tag, is also an IBM ThinkPad logo. Before you view the fingerprint reader, you can see the drivers from here if you use this laptop: lenovo t61 drivers.

Above the logo, it is the fingerprint reader.

Below the middle screen with a row of lights, including wireless signal switch state, CapsLock and NumLock and display, and hard drive, power state, etc…, all these lights to tell the user that the current operation of the computer how is it.

At the same time we can see, ThinkPad adjust the volume keys and ThinkVentange hotkeys are in this position.

Fortunately, some of the ThinkPad specific series, in addition to the red dot, but also prepared touchpad. The touchpad slip up quite smoothly and friction on the surface of the stomach and its not too big. Slip up, mouse movement speed and accuracy, also with finger stroke quite fit.

For keyboard, ThinkPad T61 still offers unparalleled control feelings. Yes, ThinkPad series of notebook keyboard has the flawless proportions. Key size, stroke, feel is perfect, the layout of the keys also take care of most of the user’s habits.

The redesign of the cooling system, also one of the important measures to improve ThinkPad T series model. T61 add a lot of heat at the bottom of the body. It is because of the heat dissipation improvements, T61 using low-speed cooling fans, at the same time Lenovo promote its T61 is the quietest T Series notebooks ever.

Logitech H600 Wireless Headphones Reviews Wireless Free Life

Logitech H600 Wireless HeadphonesThe world’s most famous computer peripherals suppliers Logitech is also famous in PC multimedia entertainment design manufacturers. With the development of multimedia entertainment, Logitech followed the market pace, attaches great importance to the game, multimedia and network audio-visual AIDS develops. In order to adapt to the current consumption trend, greatly accelerate the process of product diversification and comprehensive, its products also covers the game consoles, music players, mobile devices and home entertainment system, etc.

From the development trend of audio products, the wire is a very important factor bound to enjoy freedom of music. “Get rid of the shackles of cable, using wireless way to enjoy music” is the development direction of public expectations. In the current variety of wireless transmission protocol, 2.4G holdings are still high.

Logitech Wireless Headset H600 overall appearance is very fruity, use the black unit as the prototype, the shell surface through careful polishing processing, very simple, cool, like a jet. A blue circle on the headphones unit shell decoration, very conspicuous. And is very match with pure black raven headphones shell. The right side of the silver Logitech LOGO is very conspicuous.

Logitech Wireless Headset H600 done “weight” and “strong” to a very good balance, h600 overall is not heavy, but the work of the various parts are in place, not the kind of “touched on the reimbursement” products. In addition, h600 using on-ear design, thin sponge and can be rotated moderately active earmuffs makes very comfortable to wear.

H600 head beam section and headset airframe material is qualitative different, is not a hard plastic but a plastic material with both elasticity and toughness. Logitech clearly takes into consideration the size of the wear and comfort, and such design can effectively prevent the head beam fracture accident caused by the large head size.

In order to facilitate receive, the wireless headset h600 using a foldable design, can significantly reduce the volume. Also H600 comes with noise cancellation microphone to provide clear voice quality, and can be hidden when not needed. Also h600 use laser trimming drive unit to avoid distortion, with even better sound performance.

Logitech Wireless Headset H600 power part with up to six hours of battery life, the key part is very concise and practical, a power switch, a microphone mute switch and accessories to provide a USB charging line, and a USB signal transmitter.

H600 voice is very loose peace, smooth natural. Sound is very clean, good signal to noise ratio.H600 voice slightly slim, tri-band distributed roughly balanced, high-frequency relatively thin, extending good and with good brightness, did not feel the bleak nausea.

H600 low-frequency texture loose, diving is good, this type of low frequency is mainly helps create a feeling of comfortable and peaceful atmosphere. It does not emphasize the rhythm of the violent and strong strength, but show current music in a very gentle way. Intermediate frequency part has slightly conservative, voice is not rich, but soft style makes female interpretation is also very characteristic, not the kind of indifference sound appealing good.

H600 high-frequency line feeling clear and bright, the overall density is not high, slim body, balanced tuning it to a variety of music has certain flexibility, and individuality is a not very bright, but yet practicality headphones.

Moreover, a higher noise ratio also make it very advantageous during a voice call, a voice call will not be substantially interfere with the noise. This design is very good. H600 is a long time for listening to music headphones to listen for a long time not tired a long time will not make people feel irritable.