In part 1 of this series, I demonstrated how IP security cameras could be used to upload once-per-minute snapshots via FTP, over an IPsec tunnel to an Amazon EC2 instance. The EC2 takes care of compressing the generated series of images into daily time-lapse videos, which can be used as a second layer of security for monitoring premises. Continue reading Off-site CCTV backup part 2
Having a camera security-system (“CCTV”) can be great for loss prevention, deterring crime, and providing physical evidence when something goes amiss. Many companies use surveillance cameras connected to a DVR device to store video on-site. Of course, having the DVR in a lock-box can only go so far to protect against catastrophic accidents, and sometimes it’s desirable to have offsite backups. Continue reading Off-site backup of CCTV using the cloud
This topic is worthy of a post, if only because there wasn’t much documentation out there on getting this working. I just wanted to link an Amazon EC2 instance running Ubuntu server, to a MikroTik RouterOS device. Configuration required a bit of tweaking, and I wouldn’t expect the configuration below to work on every setup. Continue reading MikroTik to AWS EC2 instance IPsec tunnel
While ZoneMinder (www, github) is a great free and open-source surveillance camera software suite, it still lacks in some aspects. One of these is in its storage/transcoding of input video into series of JPEG images. This limits the amount of compression achieved by the system, such that a system with a high number of cameras must have a significant amount of storage to store history video past a few days. Continue reading Auto-archiving ZoneMinder recordings to video files
Sometimes setting up a VPN may be overkill for the requirements of remote access, and in that case there are secure alternatives to opening a firewall port to the outside world. My introduction to MikroTik devices came with the requirement that a client have employees accessing their office computers via. remote desktop, and I arrived at using SSH tunneling for the task due to the security offered, along with simplicity of setup on the end user’s computers. Since then, multiple client have adopted these low-cost routers for similar uses. Continue reading Two-factor authentication with MikroTik, xinetd, and gmail
Date completed: October 8, 2015
Language: Bash shell script on Ubuntu linux
This is an extension of a previous project, a charging station for the Xperia Z. I decided it would be nice to have hassle-free charging in the car, as well as a base to hold the phone in a favorable position for seeing navigation.
The new design was made to partially enclose the phone (with its protective case) and have two pogo pins to hit the charging contacts on the side, making it virtually effortless to hop in the car and charge the phone without plugging anything in.
Instead of designing the dock with a specific car or mounting system in mind, I placed two holes matched to the diameter of a wire coat hanger. This allows a mount to be created and modified after the fact, and makes it possible to use the dock in another car without printing another one.
Also this time, instead of using a USB breakout board, I hacked the end off a USB cable, made a channel for the cable in the design, and used a knot in the cable as a strain relief.
The quality of the print was much higher due to using a well-tuned Ultimaker instead of the aging Makerbot used for the last print.
What IoT (“internet of things”) setup would be complete without the wireless PIR (passive infrared) motion sensor? And anyway, at this pace of ESP8266 projects, soon everything in my house will have an IP address.
This sensor is the next in a series, intended to fulfill a purpose, provide a general template for device-to-internet communication, and aid in me figuring out better and more compact ways to build these devices.
Here’s another class project from this past spring semester, this time from Introduction to Circuit Analysis class.
Background: There are already devices that detect a smoke detector beeping and do something with it. These range from inexpensive (Life+Gear Fire Safety Night Light, $8) to capitalize-on-the-disabled expensive (SafeAwake Fire Alarm Aid with Bed Shaker, $250), and all rely on a similar premise: Identify the temporal pattern of a smoke detector beeping, and do something useful with it.
Needing to design any kind of filter for ENGR 240 class, why not select a smoke detector’s ~3200Hz? Continue reading A notch filter to detect a smoke alarm
I was looking to brush up on my C and C++ skills and become acquainted with the GNU GCC compiler, and this was one of the first topics I chose.
The idea is, take the queue of songs from gmusicbrowser and write a shell script to copy each music file to the current directory, prepending the number position in queue to the file name.
This permits the user to place all the files on a thumb drive or other device, and have them play in the same order, when the playing device plays in order of an alphabetical sorting of the directory. Two examples of devices that do this are an Onkyo TX-8050 receiver and a Kenwood DPX-500BT head unit. Continue reading Exporting a gmusicbrowser queue