Solved

Proximity Sensors

Posted on 2011-03-08
3
353 Views
Last Modified: 2012-05-11
Hi guys: I have proximity sensors installed with viper 5902 system in my vehicle. One of my friend told me that its easy to turn off these sensors by any expert theift. How to protect these sensors so that no one can turn off it easiy ?

Thanks.
0
Comment
Question by:mustish1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 34

Expert Comment

by:Michael-Best
ID: 35070177
All you can do is install the best system / sensors available.
Nothing is going to stop the expert theift (thief) if they are determined.
Look at ART theft (the most protected examples) such as:
On May 20, 2010, the Musée d'Art Moderne de la Ville de Paris reported the overnight theft of five paintings from its collection.
0
 
LVL 34

Accepted Solution

by:
Michael-Best earned 500 total points
ID: 35070320
"One of my friend told me that its easy to turn off these sensors by any expert theift."

Ask them for proof?
Car security systems are pretty good these days and will stop all but the experienced "expert" thief.

I think you need not worry about your viper 5902 system.
0
 

Author Closing Comment

by:mustish1
ID: 35071694
Thanks
0

Featured Post

Enroll in June's Course of the Month

June's Course of the Month is now available! Every 10 seconds, a consumer gets hit with ransomware. Refresh your knowledge of ransomware best practices by enrolling in this month's complimentary course for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Finding a job can be stressful - searches, resume tweaks, and networking events can be super boring. Luckily we're here to help you land your dream job!
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Bounty Board allows you to request an article or video on any technical topic, or fulfill a bounty request to earn points. Watch this video to learn how to use the Bounty Board to get the content you want, earn points, and browse submitted bount…
Where to go on the main page to find the job listings. How to apply to a job that you are interested in from the list that is featured on our Careers page.

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question