Thursday, October 4, 2007

Tips to remove Nav Bar

Log into your dashboard, go to Template -> Edit HTML. Scroll to anywhere on the template and insert the following CSS style definition in red within the head section
juz add dis simple code:


#navbar-iframe {
visibility: hidden;
}




You will notice that your contents do not shift upwards. The space is still reserved for the Navbar, but the Navbar is now hidden and not visible.

Either one of the above codes would do. You can also combine them if you'd like. For example, giving a numerical value for the height of the Navbar and hiding the visibility will give you a margin at the top and yet without the Navbar. Choose one that best fits your blog design. If you change your mind in future, and wish to have back your Navbar, simply remove the style definition.

Search Box

If you decide to remove the Navbar, you can still place a Blogger Search Box within your site. This is one of the great features in the Blogger Navbar

Tips to drive traffic with blog directories

Here are some tips you should bear in mind about leaving comments:


1. Never leave short, useless or canned comments like "Nice!", "Cool!", "Great Blog!", etc. Otherwise your comment will be deleted very soon. Take some time and read some of the content and give some solid suggestions for improvements or tell the owner why you love his/her blog. Afterall, everything is free so it takes you some time to do this. (But actually, I got a really nice tip for those who really don't have the mood to go over some tedious blogs out there. Try to give suggestions based on the layout of the blog. In this way, you only have to glance through the blog without bothering to read the content and it's always easier to criticise one's layout. You can try this: "It would be better, in my opinion, if you blend the advertisements in to your blog be setting the background colour of the ad units." By using this technique, you can give long but useful comments and gives the owner a feeling that you are here to help rather than to advertise.



2. Never be rude or too "hard-sell". Try to be humble as you won't want others to leave comments such as "I GOT A REALLY REALLY GREAT BLOG ABOUT ENGINEERING!!!! VISIT PLEASEEEEE!!!", would you? So try to keep your tone nice and kind. Use sentences like "I also got a blog about engineering, you might want to take a look at it, here's the link." or "Can you give me some advice about my engineering blog?" Your comment will always appear to be acceptable and pleasing if you don't sound like a salesperson.



3. Try to visit the blogs you have left comments on frequently and keep an eye on any replies to your post. Be responsive if the owner or visitors reply to you.



4. Leave comments again when you have written a new post or changed the layout. But remember, do this often or when you sense that the owner dislike your doing so.



Starting from today, don't just use blog directories as a listing place only, use them thoroughly by discovering blogs that are of the same category as yours. And drive traffic to your blog by commenting on them. Try it yourself and see how powerful this "comment advertising" is!



Here are some high-quality directories (what means by "high-quality" is that they review each submission to ensure that they are content-rich and blogs are well classified into categories):



Blog Announce
Blog Top Sites
Blogging Fusion Blog Directory
Yahoo!'s Blog Directory
Google's Blog Directory
BlogFlux Directory



Hope you find this useful!

Continued of Major search Engines

Submit Your Feed to the Yahoo! RSS Browse-by-Topic Directory. http://add.yahoo.com/fast/help/us/my/cgi_rss_submission

Submit your Media RSS Feed to Yahoo! Search -http://search.yahoo.com/mrss/submit?

You can submit your blog to Msn at http://search.msn.com.sg/docs/submit.aspx?FORM=WSDD

SubmitExpress.com will submit your blog free to the top 20 + Search engines.

If you don’t already have a Technorati account, sign up for one at Technorati.com and claim your blog at Technorati. Technorati is a popular weblog search engine.

Monday, October 1, 2007

Spy Surveillance Camera


Using a spy camera can make a person feel uncomfortable. Nobody likes to admit they do not trust other people. It is human nature to expect others to treat you with respect and to be able to rely on them to do the right thing. The fact is that some people should not be trusted. People take advantage of those who are trusting and protecting yourself, your family and your property with the use of a spy surveillance camera is reasonable.

The reasons people use spy cameras are mostly for protection and security. The following list contains the reasons people use spy cameras:

Monitor and watch hired help in your home. This includes babysitters and workers hired to do construction or repair work.
Watch for criminals. This could be a homeowner concerned about a possible thief or a business owner watching for shoplifters or other criminals.
Provide legal proof of a crime. This case is when you know something is going on and you use the camera to catch the criminal in the act so you can then use the tape as proof in court.
Record special events. Some businesses use spy cameras to record meetings simply because they are easy to set up and do not get in the way. People may use them in their home to capture family events so they do not have to carry around a video camera.
Monitor people or animals. Some parents use spy cameras in children or infant room to watch them without bothering them. People who own animals may put spy cameras in their barn to keep an eye on them.
Other uses can be as a way to identify visitors who knock at your front door or for hobbies like model trains, so they get a “birds eye view”.
The small size of these mini cameras makes them ideal to put almost anywhere. They usually have limited cords attached to them and can even be bought as a wireless model. They are easy to keep out of the way and they do not invade space. The uses are only limited by the imagination of the use.

Spy cameras can be put in a variety of places. Some people put them in everyday household objects like clocks or pictures where they are invisible. Depending on your reason for using it you could put it in a doll or stuffed animal. They can be secured inside a pair of glasses, sewed into a coat or hat. Some spy cameras come in such tiny sizes that they can fit on a button. The new model of cell phones have a mini camera on them that is just like a spy camera. As you can see a spy surveillance camera can be used almost anywhere you need it to be.

Smart surveillance solution

The IBM Smart Surveillance Solution is designed to help you integrate data from a variety of monitoring devices and apply advanced analytics to improve security, reduce security overhead, and increase organizational flexibility and business intelligence.

Physical security: site and infrastructure. Everybody needs it. Many have a system in place. But the old way—guards watching too many monitors and manually reviewing miles of videotape—may not be adequate for today's requirements. It costs too much. It's hard to integrate it with newer technologies. It takes up too much storage space. So it's likely that you're looking for a new approach, and that probably means digital video surveillance.

But how much more can you gain from your new digital system and technologies? When you enhance physical security (that is, guards, cameras and sensors) by deploying applications that leverage your IT network, you can use the same security data gathered by your digital monitoring systems not only to improve security and safety, but also to reduce costs and improve operations.

The IBM smart surveillance solution is designed to help you:

Integrate data from multiple sensors and analog and digital cameras into one searchable system
Search your data according to a broad range of parameters, including time, date, alert, object, size, location and color
Share data across agencies, counties and departments
Access and view information remotely from a Web browser
Prioritize critical events and store them long term
Analyze your footage for perpetrator identification, theft prevention and damage detection—as well as customer behaviors and business intelligence
Use your security data in a variety of contexts, including litigation preparation, regulatory compliance documentation and sales conversion analysis.
Because you don't have to manually search through piles of videotapes, and because you can target your search more specifically, you are more likely to detect threats and apprehend perpetrators, which helps improve security and operations. Regardless of whether your business is located in the public or private sector, the ability to reduce your need for manual review and for redeploying armed guards can help reduce your costs.

Event-prioritization capabilities can help you lower your data management costs. The added flexibility that comes from being able to add new technology or analytical capabilities to the open-architecture solution framework can enhance the agility of your business. And the ability to use your data in a variety of ways to support business decision making can help you get more return from your security investments.

As one of the most experienced systems integrators in the world, IBM leverages its worldwide consultants and a network of established digital video surveillance technology providers to bring you integrated solutions that include cameras, sensors, servers, networking technology, software, services and analytics. Our proprietary smart surveillance technology allows a wider range of search capabilities and helps you leverage your data in more ways than virtually any other offering on the market today.

Which is the Simplest Home Surveillance Device?

If you used to think that installing a Home Surveillance System all by yourself is beyond your capacity, it is time to reconsider this preconception. Not only will you be able to set up by yourself an operative, if simple, complete system, but in the process you will also learn a lot and gain confidence for more complex tasks.

Being this proposed system a simple one does not deduct from its importance, neither of its surveillance function, nor of the opportunity it gives you to familiarize with gadgets, jargon, applications, hardware and components. You are likely to appreciate the advantages of setting up a home surveillance system meant to give you practical answers, a feeling of security and peace of mind.

What we propose to undertake may have a dual purpose: you should decide which is the one responding to your needs the most. Not only that, but you may prefer at any time to switch over from one task to the other or to cater to both functions.

In short the first task, common to every household, is dedicated to the control of the entrance door. Sure you can get up at every ringing at the door, go there, either look through the peep-hole or open a crack with the door chain to see who is calling.

Would it not be easier and less tiring to cast only a glance on your monitor, conveniently placed where you are most of the time? You may need an intercom if you wish to exchange a few words with the person at the door.

But in addition you may be able to set up a recording capability to monitor all the calls that occurred when nobody was home. This feature would add a lot to your feeling of security, as you may be alerted of suspects or actual risks.

A plain camera, a monitor and the link in between is all that is needed for the simplest system. But having to set it up makes you think of all the options and requires selection, decisions and actions at every step.

We think that this part of the exercise is quite important in that it may enrich your experience and prepare you to the more demanding and complex applications you may consider for increased security.

The other usage that you may wish to implement if you have this need is for the constant check of the well being of your baby in the cradle. Again a short glance on the monitor lets you know if your presence is required, without leaving the company for going upstairs or wherever the baby is sleeping.

Without compromising the attention you want to give your baby, you gain an extra measure of freedom you can enjoy. Is not it worth the trouble?

In conclusion, by selecting to implement this fairly simple solution for your home surveillance, you not only fulfill a clear need, gaining security and comfort, but you also become acquainted with the surveillance equipment and practice and you get confidence for the next more demanding surveillance task.

Elia Levi is a retired engineer. He built a website to assist with a step-by-step Guide to understand, design, select and set up, all by yourself the best and least expensive Surveillance System for your Home Security. Read more on the subject of this article at http://www.1st-diy-home-surveillance-guide.com/ and Entrance-and-baby-cam.html

The EyeBall tossable surveillance device



The Eye Ball is about the size of a baseball (roughly 3.25 inches), weighs less than one pound and is encased in a rubber and polyurethane housing that enables it to be thrown through windows or doors and bounced off walls. It’s when the Eyeball lands that it becomes incredibly useful as it can capture video up to 25 metres distance and audio up to five metres, and then wirelessly send that real-time info up to 200 metres to handheld device. An omnidirectional lens rotates at 4 rpm and provides a 55-degree horizontal and 41-degree vertical field of view. It doesn’t even need daylight as it also has night vision capability. Warfighters or Law enforcement officers can roll, toss, or drop the rugged Eye Ball into virtually any hazardous situation - providing the immediate visibility required for users to make safe, intelligent decisions in dangerous environments.

Once deployed, the Eye Ball captures and transmits real-time audio and video to the Eye Ball's Personal Display Unit (PDU). In addition to serving as a wireless receiver, the easy-to-use PDU enables users to direct the Eye Ball with precision, focusing the video camera throughout the Eye Ball's 360-degree viewing area. The PDU also activates the Eye Ball's near-infrared "night vision" for dark operations. The Eye Ball streams audio and video up to 200 yards away from the PDU. The Eye Ball orients itself automatically to provide users with a clear picture. Users control the Eye Ball's 360-degree rotation via the PDU and gaining visibility through its 6.4 inch color screen.

Internal Eye Ball near-infrared LEDs illuminate dark environments and can be set manually or automatically.

The Eye Ball R1 is also quite versatilite and attaches quickly to a pole - providing visibility into ceilings or attics, looking around corners, down hallways, or into rooms.

The Eye Ball and PDU use lithium ion batteries and maintain battery power for up to four and two and one-half hours respectively. The Eye Ball and PDU units are easily rechargeable to ensure they are always ready for deployment.

The Eyeball is sold in the United States by Remington Technologies Division and manufactured and marketed in the rest of the world by Isreali Company ODF Optronics

Nike+ IPod = Surveillance



If you enhance your workout with the new Nike+ iPod Sport Kit, you may be making yourself a surveillance target.

A report from four University of Washington researchers to be released Thursday reveals that security flaws in the new RFID-powered device from Nike and Apple make it easy for tech-savvy stalkers, thieves and corporations to track your movements. With just a few hundred dollars and a little know-how, someone could even plot your running routes on a Google map without your knowledge.

The Nike+ iPod gives runners real-time updates about the speed and length of their workouts via a small RFID device that fits into the soles of Nike shoes, and broadcasts workout data to a small receiver plugged into an iPod Nano.

While this setup sounds convenient and cool, it didn't sit well with Scott Saponas, a computer science graduate student at the University of Washington in Seattle. After enjoying his Nike+ iPod for a few months, Saponas began to suspect there might be other, more nefarious uses for the gear.

He brought his concerns to University of Washington computer science professor Yoshi Kohno and fellow graduate students Carl Hartung and Jonathan Lester. After just a few weeks of tinkering, the four researchers discovered that the Nike+ iPod is, as Kohno put it, "an easy surveillance device."

The first problem is that the RFID in the shoe sensor contains its own on-board power source, essentially turning your running shoe into a small radio station capable of being received from up to 60 feet away, with a signal powerful enough to be picked up from a passing car.

Compare this with the roughly 3-centimeter to 10-inch read range of a typical consumer-grade RFID, such as the kind you find in smart tags in Gap clothing or in credit cards, which is passively powered by the reader.

Additionally, the sensor will reveal its unique ID to any Nike+ iPod receiver. With a quick hardware hack that Kohno said "any high school student could do in the garage," the researchers hooked a Nike+ iPod receiver up to a Linux-based "gumstix" -- a tiny, $79 computer that could easily be hidden in door frames, in trees next to jogging trails or in a pocket.

In their report, the researchers detail a scenario in which a stalker who wants to know when his ex-girlfriend is at home taps into her Nike+ iPod system. He simply hides the gumstix device next to her door, and it registers her presence as she passes by in her Nike shoes. If he adds a small "wifistix" antenna to the device, it can transmit this information to any nearby Wi-Fi access point and alert him to her presence via SMS or by plotting her location on Google Maps.

A thief could use a similar set-up to case several houses at once, figuring out when Nike-wearing owners are at home and when they aren't.

Neither Apple nor Nike had comments at press time.

Electronic Frontier Foundation staff attorney Lee Tien says the Nike+ iPod is a harbinger of things to come. "We're going to see more devices like this in the next few years," he said. "This isn't just a problem with the Nike+ iPod per se -- it's a cautionary tale about what happens when companies unwittingly build a surveillance capacity into their products."

UC Berkeley RFID researcher David Molnar agreed with Tien, adding, "This shows a need for independent oversight and investigation of these technologies before they go to market. These things happen because the people building devices don't think about privacy implications."

Molnar also speculated about how easy it would be for a company to build their own tiny readers and deploy them in a large environment, selling the data stream to those who would track spouses or teens, or collect information about how many people wearing Nikes visit malls or movie theaters. "Given that there are no laws about skimming data in California right now, it would be perfectly legal to do it there," he said.

The researchers, for their part, just want to see Apple, Nike and other manufacturers fix the problem. They offer a simple solution in their report, which is to build the sensors to speak to only one reader.

"Using relatively standard cryptographic techniques, you could make it very difficult to listen to broadcasts from somebody else's sensor," said Kohno. He hastened to add that he doesn't believe Apple and Nike purposefully designed the sensors to be surveillance-friendly. "I just think companies should be as aware of privacy issues as they are of safety issues," he said. "Too often, they aren't."

Medical Screening and Surveillance

Medical surveillance is the analysis of health information to look for problems that may be occurring in the workplace that require targeted prevention. Thus, surveillance serves as a feedback loop to the employer. Surveillance may be based on a single case or sentinel event, but more typically uses screening results from the group of employees being evaluated to look for abnormal trends in health status. Surveillance can also be conducted on a single employee over time. Review of group results helps to identify potential problem areas and the effectiveness of existing worksite preventive strategies. The following resources contain medical surveillance information including specific hazards and surveillance guidelines.

Surveillance. National Institute for Occupational Safety and Health (NIOSH) Safety and Health Topic.
Indicators for Occupational Health Surveillance. Centers for Disease Control and Prevention (CDC), Morbidity and Mortality Weekly Report (MMWR) 50(RR01);1-7, (2007, January 19).

Health Hazard Evaluations. National Institute for Occupational Safety and Health (NIOSH). NIOSH conducts investigations of possible health hazards in the workplace to determine whether any substance normally found in the place of employment has potentially toxic effects in such concentrations as used or found.
The Work-Related Lung Disease Surveillance Report, 2002. US Department of Human Health Services (DHHS), National Institute for Occupation Safety and Health (NIOSH) Publication No. 2003-111, (2002). Provides national and state-specific data of pneumoconiosis and other work-related respiratory conditions.
TLV/BEI Resources. American Conference of Governmental Industrial Hygienists (ACGIH). This organization of government and industrial hygienists publishes biological exposure indices for use which can be used for criteria for evaluating biological samples collected for medical surveillance.
Tracking Occupational Injuries, Illnesses, and Hazards: The NIOSH Surveillance Strategic Plan. US Department of Human Health Services (DHHS), National Institute for Occupation Safety and Health (NIOSH) Publication No. 2001-118, (2001, January). NIOSH embarked on a process to assess current surveillance needs and to identify its goals for the next decade. The Surveillance Strategic Plan is the result of that effort.

Best Practices in Workplace Surveillance: Identification and Tracking of Workplace Injury, Illness, Exposures, and Hazards. National Institute for Occupational Safety and Health (NIOSH). Includes presentations and handout materials.
Links Between Public Health and Worksite Surveillance of Occupational Illness, Injuries, and Hazards
Occupational Medical Surveillance Manual. US Department of Defense (DoD), (1998, May). Provides minimum standards for medial surveillance programs to help occupational health professionals and others recognize and evaluate health risks associated with specific workplace exposures.
General Information. Chapter 1. Describes the general requirements for medical surveillance, types of examinations, and record keeping.
Medical Surveillance for OSHA-Regulated Exposures. Chapter 2. Describes OSHA related medical surveillance.
Medical Surveillance Endorsed by the Department of Defense. Chapter 3. Includes additional medical surveillance protocols endorsed by the DoD, where OSHA does not provide guidance.
National Occupational Exposure Survey Analysis of Management Interview Responses. US Department of Human Health Services (DHHS), National Institute for Occupation Safety and Health (NIOSH) Publication No. 89-103, (1998, March). Provides data on the extent and conditions of potential worker exposure to chemical, physical, and biological agents.
A Guide for the Management, Analysis, and Interpretation of Occupational Mortality Data. US Department of Human Health Services (DHHS), National Institute for Occupational Safety and Health (NIOSH) Publication No. 90-115, (1990, September). Provides guidelines for state health departments interested in occupational mortality surveillance.
National Occupational Exposure Survey Sampling Methodology. US Department of Human Health Services (DHHS), National Institute for Occupation Safety and Health (NIOSH) Publication No. 89-102, (1990, February). Describes the method used to select the sample of plants surveyed and the estimation techniques used to project survey data to national estimates.

For additional information, see OSHA's Safety and Health Topics Pages on:

Arsenic
Asbestos
Benzene
Bloodborne Pathogens and Needlestick Prevention
1,3-Butadiene
Cadmium
Carcinogens
Cotton Dust
Dermal Exposure
Emergency Preparedness and Response
Ergonomics
Ethylene Oxide
Formaldehyde
Hazardous and Toxic Substances
Hazardous Waste
Laboratories
Lead
Methylene Chloride
Noise and Hearing Conservation
Permissible Exposure Limits (PELs)
Respiratory Protection
Silica, Crystalline
Tuberculosis

VISEC turns your computer into a Powerful Video Surveillance System!

Visec® can run on a PC or MAC* 24 hours a day, even while you work on your computer.
Use your existing computer
Supports web camera, wireless, spy camera, ip cameras such as AXIS, Arecont IQ, Panasonic, Pixord, , and generic support for standard mjpeg. capture cards, USB capture devices and more.)
Be Notified to your cell phone, home or office when motion is detected
Visec will record all video when motion is detected, and even alert you to your phone or pda
Log in from anywhere in the world, including your cell phone to see live or past video.
No Monthly Fees
Easy to use - Installs in minutes

With VISEC you can keep an eye on everything you ever wanted without spending a fortune.
Keep an eye on your home, office, cars, and valuables. Watch your pets. Watch your kids. Keep an eye on your nanny or babysitter. Best of all you can do this from any location in the world via the Internet! VISEC is designed to be highly configurable and can even be used as a stealth surveillance system, allowing the program to operate secretly with just a few mouse clicks. And did we mention that Visec is extremely easy to use, installation and configuration will take only 5 minutes, even at a novice or newbie's hands. All that for just a fraction of a regular security system price.

Visec will turn your computer into a POWERFUL SECURITY SYSTEM in 5 minutes or less.
The VISEC program can be set to record all VIDEO activity, or just when motion appears. The program can email you when it detects motion and even upload all images to different websites. With the Internet, you can connect directly to your personal computer and see in real time, live and historical video. Visec even makes it possible to send out email alerts with surveillance recordings included.

This allows you to remotely whenever and whatever activity your camera captures. Visec utilizes a breakthrough in motion detection technology that incorporates complex and advanced algorithms (without the need of separate sensors) allowing an operator to just record only when motion is detected, saving you time and the cost of continuous recording as in traditional CCTV Systems.

Remote Surveillance Camera Systems

A newer digital video recorder and surveillance camera can offer the ability for remote surveillance, which has become increasingly popular. A standard monitoring specification enables various network monitors to exchange video monitoring data. The dvrs include remote surveillance software, enabling users to log on from a distant pc, connect and monitor the surveillance camera connected to the Digital Video Recorder effortlessly. Clients can be notified of motion activated alarm recordings by email as well keeping the client informed.

Remote surveillance and monitoring can be accomplished by using your own PC as well. Dvr cards or pci cards installed on your PC include software, which can turn anyone's PC into their very own digital video recorder and surveillance camera system. An IP surveillance camera or network surveillance camera have built in web servers that are connected to the internet and can be monitored through remote surveillance from any PC. This type of surveillance camera has built in PC based software allowing pan, tilt and zoom function via the remote surveillance and monitoring software included and preloaded. Remote surveillance is becoming more popular and also more affordable for surveillance camera systems. We also offer remote surveillance monitoring kits that utilize a phone line when broadband is not available. If you have questions or want more details on remote surveillance, call us today and we'll gladly help you plan your remote surveillance camera system whether 1 or 100 cameras.