Solved

Security System with Wireless Cameras

Posted on 2004-03-25
4
329 Views
Last Modified: 2010-04-11
I am interested in installing security system.
I need to use 3 wireless cameras to be controlled by my PC p II at 633 mgh and as 4 camera to use the DOOR VIDEOPHONE if possible.
The problem is I don't know what exactly or how exactly I will conect them to my PC.
Can you please suggest some possible solution?
Thanks a lot.
 
0
Comment
Question by:Krstemk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 25 total points
ID: 10684499
0
 
LVL 18

Assisted Solution

by:chicagoan
chicagoan earned 25 total points
ID: 10686622
There are essentially 2 ways to go to use digital recording and PC control:

Using traditional CCTV cameras and a multiline video capture card and appropriate software:
i.e. http://www.skywaysecurity.com/

Using ethernet/wireless cameras and software.
(see above)

Traditional CCTV cams come in a great deal more styles (doorbell cam, ceiling dome, outdoor low light, etc) and seem a lot more durable, IMHO
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Make the most of your online learning experience.
A look at what happened in the Verizon cloud breach.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month7 days, 21 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question