Search results

  1. T

    US Elections (& Politics) :)

    About 38,500 people and I imagine most are not from there. It looks massive on camera, but if you consider the population of that whole area is 3.76 million people then this is an insignificant amount. You see, before they trained all of these police to try to tame a mob crowd, the military was...
  2. T

    US Elections (& Politics) :)

    Its actually a FACE act and a 18 U.S. Code § 247 violation.
  3. T

    US Elections (& Politics) :)

    The protestors have to show George Sorros something since he's been paying them $55-85K/ year each person. Now you know why they don't have a W2 job and why soon the protestors will be labelled as a paid terrorist group and the Military will get involved.
  4. T

    Issue with Monoprice cable and RJ45 plugs

    UTP solid cat6 is 28-24Ga and Cat 6A and 5E is 24-22Ga Those crimp should work without the inserts which is used for small wire.
  5. T

    Climate Change

    Actually its not co2, but the lack of O2 breakdown due to the oil industries killing of the fauna in the ocean with its pollution and oil spills. An international team of scientists have been tracking it since 1989. Historical Global Atmospheric Oxygen Levels Graph
  6. T

    Example: How Drones have changed trench warfare .. ( drone )

    Who do you think that came up with fiber optic connected drones after the US Military bought all those drone RF jammers.
  7. T

    US Elections (& Politics) :)

    As someone who is a retired counter terrorism analyst, I can tell these "protest" are organized and most police, FBI, CIA, ATF, ICE have been train to counter it as an anti riot engagement trained by the Israeli Massad and ZAKA. 9 years ago 14 years ago just to give you an idea this is...
  8. T

    US Elections (& Politics) :)

    Seriously. Eveyone knows the socialist's agenda. What has not happen is 500 military troops just come in, open fire, and wipe them out like what happened in 1968. Back then that was another democrat socialist movement.
  9. T

    US Elections (& Politics) :)

    On this subject its has to be addressed properly, through letters and emails to senators and congressmen. Without that it does not go anywhere. Protest is an outdated format because it serves no one and can escalate to riots, and solves nothing. Protesting against police/law enforcement/military...
  10. T

    48 Port RJ-45 PoE ++ Switch Suggestions

    what are the cameras? wattage rating? what camera model # you are using and how many of them? Because we need to find how much total wattage in POE you need so its easier to select one at a reasonable price.
  11. T

    Static IP setup , Camera, router, or both?

    Set static IPs on all cameras and wireless bridges in the device's configuration page.
  12. T

    Pandemic threat? Anyone else concerned?

    Exactly!
  13. T

    Pandemic threat? Anyone else concerned?

    Looks like the Chinese Facebook Properganda. Working on lifting barriers so everyone can sue Facebook individually as well as class action.] But remember, the enemy wears the mask. As the previous mask and pandemic response expert before Fauci, I never recommend wearing those dust masks...
  14. T

    Pandemic threat? Anyone else concerned?

    Sorry to be gone for a bit. Been busy but I wanted to share what I help make happen:
  15. T

    How insecure is port forwarding for Blue Iris if you have an incredibly strong password?

    The sites that people use like noip are scanned and clients attacked. That is why port forwarding is bad. Splitting the wan and giving it its own outside address is a better method of self hosting. VPNs, they are safe to a point.
  16. T

    Anyone run 2 ethernet wires through the junction box grommet?

    That is why I drill a 3/4 inch hole and run the cable in the attic. Rarely I have used surface mount in a install, but when I did I used flat conduit as it has a better clean line look than attaching a wire every 16 inches to a flat surface. On eaves I shoot for about half way from the wall...
  17. T

    Building separate networks for home use

    Its all in application. But I would assign a different outside IP for camera hosting instead of port forwarding on my home network. Not only i remove potential hacking from having a different IP address, I wouldn't have the performance hit either. In town I have only set up 3 businesses that...
  18. T

    Building separate networks for home use

    What you have is similar but it operates differently. What happens when you lease an IP or two (sometimes you even have to lease four ip addresses, depends on how the local isp sells them ) is that those IP addresses are assigned at your routers. And instead of sharing bandwidth, you are...
  19. T

    Cameras and browser

    One thing you can't do on some cameras is run concurrent connections from the same computer, because its already logged in at a different service port. There are some that only allow one login on a service port or you have to configure multiple users for that function to work. Its just something...
  20. T

    POE testing to see if Cable is bad?

    I will tell you the common thing you should change out arbitrarily when you loose connection over time is the RJ-45 ends on the POE Ethernet cables. Its best to use the old style end than the feed through because the feed through design has a higher failure rate outside. Long runs will shorten...
  21. T

    ZeroTier and Dual Nic

    The pitfalls of self signed certificates is well documented and the standard practice to deploy Public TLS/SSL CA Certificates with these programs when you apply the internet to them. Ignore me if you want, but its your own fault if you get hacked.
  22. T

    ZeroTier and Dual Nic

    NEVER underestimate a hacker. Especially advanced ones that can make efficient automatic code and pass it around to other hackers.
  23. T

    ZeroTier and Dual Nic

    Then they need to repair it and others publish the CVE and boycott their products until they comply. It is ludicrous to cover for them by hiding a vulnerable system and not say anything about it.
  24. T

    Long outdoors netwok cable run

    Believe me, some of this when you are going into the hardware level and trying to explain it in a concise way to a general audience, its hard not to appear vague.
  25. T

    Is ZoneMinder still being actively developed?

    So you are trying to consolidate viewing into one page, correct? a lot of them have send alerts via email so that theoretically can be used and have it forward into your openHAB (which looks like a raspberry pi 4) In your custom web page, you would use the <object> html tag for each camera. you...
  26. T

    Is ZoneMinder still being actively developed?

    Sounds interesting, what cameras you are using? With linux, all you have to do is create an internal webpage and assemble your functional code. The bulk of these camera viewing software is web2.0 so they are not making real programs for remote viewing and using ASP.net for their programing...
  27. T

    ZeroTier and Dual Nic

    Zerotier by its self 'Phones home' and OpenVPN uses self sign certificates so its suseptible to MTM attacks. Unless the NVR uses poor authentication methods, There is nothing wrong with serving a NVR on its own outside IP address with a public CA certificate. Which is the real secure method.
  28. T

    Long outdoors netwok cable run

    That is because people can explain the same function in different ways and even different PSE controller IC datasheets will explain the same thing in different ways. Here is an IC that is used in 8 port POE switches: https://www.ti.com/lit/gpn/tps23881b They explain it as a "current fold back...
  29. T

    Setting up VPN/VLAN and Dual NIC

    Like I said both methods are valid. The difference is one is by vlan and the other is by a bridge router. Since they want to know how to set it up without configuring any VLANs I showed them those examples.
  30. T

    Setting up VPN/VLAN and Dual NIC

    Its not really a loop because the camera network is a separate static network. Its not like the BI machine has its interfaces bridged. The two common ways is using a bridging router or use managed switches at both ends with the ports divided into two vlans and a cable patched across. Either way...