Physical Barriers. Physical Security. Mantraps. Mantrap. Week 6 Part 1. A chain is only as strong as its weakest link

Size: px
Start display at page:

Download "Physical Barriers. Physical Security. Mantraps. Mantrap. Week 6 Part 1. A chain is only as strong as its weakest link"

Transcription

1 Physical Security Physical Barriers Week 6 Part 1 A chain is only as strong as its weakest link Physical Barriers Mantraps Naturally, physical barriers must be in place to prevent physical access to a restricted area Some barriers restrict all access (a wall) Some require authentication Many high security areas use a special room called a mantrap It separates a secure area from a nonsecured area There are only two interlocking doors each door has a different code only one person may be in the room at a time 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Mantraps Mantrap Attacker may get past the first door but get trapped in the second exit code is different from the entrance code they are stuck and doomed! 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

2 Other Devices Some Fencing Deterrents Video surveillance closed-circuit television (CCTV) cameras transmit signal to limited set of receivers cameras may be fixed or able to move passive deterrent Fencing barrier around secured area 8 topped with barbed wire slanted at 45% angle modern perimeter fences are equipped with other deterrents Technology Anti-climb paint Anti-climb collar Roller barrier Rotating spikes What is Does Nontoxic petroleum gel-based paint that is thickly applied. Doesn't not harden. Used on poles, pipes, wall tops, and railing above head height. Spiked collar put at the top of a pole. Can be used to keep attackers away from cameras. Non aggressive. Top of wall contains a long rod that can spin. Prevents attacker from getting a grip. Spiked rings at the top a fence or wall. Not possible to throw a rug over like barbed wire. 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Roller Barrier Rotating Spikes 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Tailgating Methods of Tailgating Tailgating is the act of following behind an authorized person through an access door Shoulder surfing is the act of casually looking at someone entering a keypad code Tailgater calls please hold the door Waits outside a door and enters when an employee leaves Employee conspires with unauthorized person to walk together through open door 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

3 Authentication Authentication Protecting the Cyber-Key Whether it is to get through an access door or log into a computer, a person must be authenticated Users must provide credentials some proof that the person the "real" user rather than an attacker 6/29/2018 CSC Cook - Sacramento State - Summer Authentication Types of Authentication Credentials There are various approaches to authentication Organizations will use at least one, but others will use multiple systems depending on the value of the asset 1. What you know user has special knowledge e.g. safe combination 2. What you have the user has an physical device e.g. keycard to open a door 3. What you are attribute of the user that is unique e.g. face recognized by guard 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer What You Know What You Know Knowledge of the User is the Key The most common way to authenticate users is to give them special, private, information Logging into a system consists of revealing that data to the computer software 6/29/2018 CSC Cook - Sacramento State - Summer

4 What You Know: Passwords Cipher Locks When a user logs in asked to identify themself enters username asked to authenticate enters password Passwords provide only weak protection More sophisticated alternative to a key lock Combination sequence necessary to open door Can be programmed to accept an individual s code at only certain days or times 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Cipher Locks Cipher Lock Also can records when door is opened and by which code Although vulnerable to shoulder surfing some units will rearrange the numbers using LED digits Often used in conjunction with tailgate sensor 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Have You Have What You Have Knowledge of the User is the Key Another form of authentication is to require the user to process a physical item This is commonly used for physical access to buildings such as keys, RFID badges, etc 6/29/2018 CSC Cook - Sacramento State - Summer

5 Keyed Locks Keyed Locks Hardware locks are a standard security system This provides minimal security, but very lost cost and convenient Deadbolts can add to security Keyed locks requires a physical key to open the lock security can be compromised if keys lost, stolen, or duplicated attackers can use lock picking to circumvent security 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Residential & Deadbolt Locks Key Management Procedures Inspect locks regularly Issue keys only to authorized users Keep records of who uses and turns in keys Keep track of issued keys 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Key Management Procedures Physical Token Locks Master keys should not have identifying marks Secure all unused keys put in a locked safe it should be monitored by camera or security Mark duplicate master keys with Do not duplicate A physical token is another alternative access method Like a cipher lock, physical token locks interact with a computer 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

6 Physical Token Advantages Type of Token: Cards Advantages over passwords token code changes frequently attacker has to crack code within time limit if token is stolen, it becomes obvious Token system variations some systems use token code only others use code in conjunction with password some combine PIN with token code Smart card contains integrated circuit chip that holds information contact pad allows access to chip contents contactless cards require no physical access Common access card (CAC) bar code, magnetic strip, and bearer s picture issued by US Department of Defense 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Type of Token: RFID Radio frequency identification (RFID) tags are common, reliable alternative to keys Key features: read by a proximity reader can be affixed inside ID badge badge can remain in bearer s pocket 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer RFID Strip How RFID works 1. Badge is created with a unique code (and the owner's photo) 2. Radio waves hit the badge which emits a signal identifying the owner 3. Proximity reader receives signal and activates the lock release 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

7 RFID Can Track Type of Token: Disconnected Code Maintain a list of who have permission to enter Record time they entered & left Log any access attempts (did someone with low access try to open the door?) Besides the RFID versions, there are disconnected code tokens small devices with a window display synched with an authentication server code is generated from an algorithm code changes every 30 to 60 seconds 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Disconnected Code Tokens Disconnected Code Tokens Token login steps user enters username and code from token authentication server looks up algorithm associated with that user generates its own code compares it to the entered code if a match, user is authenticated 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer What You Are The User Is the Key What You Are The third form of identification is characteristics about the user that makes them unique Physical credentials and passwords can be stolen But, this is difficult for an attacker to fake or steal 6/29/2018 CSC Cook - Sacramento State - Summer

8 Biometrics Fingerprint Scanners Standard biometrics uses person s unique physical characteristics for authentication Examples: fingerprint scanners (most common type) face hand eye characteristics Static fingerprint scanner takes picture and compares with image on file common on doors and panels Dynamic fingerprint scanner uses small slit or opening common on laptop computers 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Dynamic Fingerprint Scanner Disadvantages of Standard Biometrics Cost of hardware scanning devices Readers have some amount of error reject authorized users false positive accept unauthorized users false negative is it better to fail-safe or fail-open? Privacy Concerns 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Behavior Biometrics Behavior Biometrics: Keystroke Behavioral biometrics authenticates by normal actions the user performs Examples: keystroke dynamics voice recognition computer footprinting Keystroke dynamics attempts to recognize user s typing rhythm All users type at a different pace Provides up to 98 percent accuracy Uses two unique typing measurements dwell time it takes to press and release a key flight time between keystrokes 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

9 Voice Recognition Several characteristics make each person s voice unique Voice template can be created Phonetic cadence of putting words together is part of real speech pattern Difficult for an attacker to authenticate using a recording of user s voice 6/29/2018 CSC Cook - Sacramento State - Summer Computer Footprinting Cognitive Biometrics Relies on typical access patterns Geographic location Time of day Internet service provider Basic PC configuration Cognitive biometrics relates to perception, thought process, and understanding of the user Easier for user to remember because it is based on user s life experiences Difficult for an attacker to imitate 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Cognitive Biometrics Example identifying specific faces user selects memorable lifetime events and is asked for details about them Predicted to become a key element of authentication in the future Hardware Security Stop Theft by Locking It Down! 6/29/2018 CSC Cook - Sacramento State - Summer

10 Securing Devices Hardware Security It is important to prevent unauthorized users from gaining physical access to equipment Aspects of securing devices physical access security host hardware security mobile device security Hardware security is the act of physically securing host system hardware Some equipment is expensive and may contain important data Theft of a device can result in massive financial damage 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Hardware Security Cable Lock Portable devices often have steel bracket security slot Cable lock is inserted into slot and secured to device The cable is connected to lock secured to desk or immobile object 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Locking Up Devices Mobile Security Laptops may be placed in a locked safe Locking cabinets can be prewired for power and network connections allow devices to charge while stored Mobile device security many security provisions that apply to laptops apply to mobile devices since they are basically the same Mobile devices unique security features remote wipe / sanitation data can be erased if device is stolen GPS tracking - can pinpoint within 100 yards 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

11 Dumpster Diving Dumpster Diving Low tech and very effective Dumpster diving is the act of digging through trash to find useful information Business often discard items they do not think have value But it can provide: inside knowledge needed for social engineering knowledge for network attacks 6/29/2018 CSC Cook - Sacramento State - Summer Valuable Dumpster Items Valuable Dumpster Items Calendars can reveal employees are out of town at a particular time wall calendars can have info about birthdays, events, etc Phone directories gives attackers a list of names and how to contact them great for impersonations Old hardware old USB flash and hard drives contain massive amount of data all old computers must have hard drives removed and destroyed System Manuals shows the systems being used attackers can concentrate on know vulnerabilities 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Valuable Dumpster Items Valuable Dumpster Items Policy manuals can reveal true level of security show where weak points are Memos seemingly unimportant memos can often provide small bits of useful data attackers use this to perfect impersonations Organization charts can identify who in the organization have authority shows who can impersonate and who to trick 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

12 A True Example A True Example 1. One attacker gather preliminary data dumpster dived for some basic info called human resources asked for and got names of key employees 2. Group of attackers using these names approached door to building pretended to have lost key code let in by friendly employee entered another secured area in the same way 3. Group entered the CFO s office group had learned CFO was out of town because of his voic greeting message 4. Gathered information from unprotected computer 5. Dug through trash to retrieve useful documents 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer A True Example 6. One attacker called the help desk from CFO s office pretended to be CFO urgently asked for password help desk gave password 7. Attackers then left building with complete network access and company files USB Thumb Drives Thumbs Down to Malware 6/29/2018 CSC Cook - Sacramento State - Summer USB Thumb Drives Viruses in USB Thumb Drives In the past, viruses used to be spread using floppy diskettes This technology is obsolete - replaced by USB thumb drives Sadly, USB technology makes it even easier to spread viruses than ever before Files (usually.exe) on thumb drives, can be infected just like on normal hard drives However, USB drives can be autorunned when inserted, the operating system looks for a hidden file called "autorun.inf" this is a text file which tell which files should be executed immediately this is why your installation CDs startup automatically! 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

13 Viruses in USB Thumb Drives Example autorun.inf contents A virus can "hitchhike" on the USB drive How it works: virus installs as the "autorun" software the actual virus will be a.exe file (and usually hidden somewhere on the thumb drive just by inserting an infected thumb drive, the virus executes and spreads [autorun] open=setup.exe icon=setup.exe,0 label=software Installation Mode=Administrator 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Human Engineering and USB Human Engineering and USB Attackers can leave an infected USB thumb drive outside a company of government office Often this is placed in a nearby business a bench or table outside the building near a communal area like the smoker's area An employee finds the thumb drive and wants to help the person that "lost" it takes it into the building past the security to their computer they put it in, and the virus spreads As a result, most institutions do not permit USB drives 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer Protecting Your Computer Fortunately Protecting your computer Microsoft created a page that guides you through disabling autorun URL: Protecting your thumb drive to protect the thumb drive, create a "autorun.inf" file that cannot be changed by a virus an easy way is to create an "autorun.inf" folder! Microsoft decided to disable autorun on USB drives with a February 2011 update CD/DVD/Blueray still function the same they are read-only (for the most part) viruses can still infect from these but they have to be infected when burned 6/29/2018 CSC Cook - Sacramento State - Summer /29/2018 CSC Cook - Sacramento State - Summer

Software Security. Encryption. Encryption. Encryption. Encryption. Encryption. Week 5 Part 1. Masking Data from Unwelcome eyes

Software Security. Encryption. Encryption. Encryption. Encryption. Encryption. Week 5 Part 1. Masking Data from Unwelcome eyes Software Security Encryption Week 5 Part 1 Masking Data from Unwelcome eyes Encryption Encryption Encryption is the process of transforming data into another form Designed to make it readable only by those

More information

IMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE

IMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE IMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE This document is designed to be a template for a document you can provide to your employees who will be using TimeIPS in your business

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

AIMICT.ORG AIMICT Newsletter

AIMICT.ORG AIMICT Newsletter SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program

More information

VisorTrac A Tracking System for Mining

VisorTrac A Tracking System for Mining VisorTrac A Tracking System for Mining Marco North America, Inc. SYSTEM APPLICATION The VISORTRAC system was developed to allow tracking of mining personnel as well as mining vehicles. The VISORTRAC system

More information

Intellectual Bank Safekeeping System

Intellectual Bank Safekeeping System Intellectual Bank Safekeeping System Joshua Bapu.J Assistant Professor Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India S.R.Aryalekshmi Dr.Sivanthi Aditanar College of Engineering

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

ORANGE PEEL December 6 th, 2006

ORANGE PEEL December 6 th, 2006 December 6 th, 2006 BY: ERIC GUIDA Sacramento Fire Department Engine 57 ENGINE COMPANY OPERATIONS- RESIDENTIAL FORCIBLE ENTRY Forcible entry is usually considered a truck company operation. Engine companies

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Bloodhound RMS Product Overview

Bloodhound RMS Product Overview Page 2 of 10 What is Guard Monitoring? The concept of personnel monitoring in the security industry is not new. Being able to accurately account for the movement and activity of personnel is not only important

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

Trunking Information Control Console

Trunking Information Control Console Trunking Information Control Console One Touch Communication and Control In a TICC we can: Initiate a call in one touch Send a status in one touch Call a group of users in one touch See what type of call

More information

The little BIG book of badness

The little BIG book of badness The little BIG book of badness (how to stay safe on the Internet - a guidebook for students and parents) You re safer in our world Use this book to find out how you and your computer can stay away from

More information

RED TACTON.

RED TACTON. RED TACTON www.technicalpapers.co.nr 1 ABSTRACT:- Technology is making many things easier; I can say that our concept is standing example for that. So far we have seen LAN, MAN, WAN, INTERNET & many more

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

Network Scanner Guide for Fiery S300 50C-KM

Network Scanner Guide for Fiery S300 50C-KM Network Scanner Guide for Fiery S300 50C-KM Read this manual before printing. Keep readily available for reference. User's Guide Introduction Thank you very much for purchasing the Fiery S300 50C-KM. This

More information

ID station Photomatic

ID station Photomatic Version 7.3 Last change : August 2016 Page 1 Introduction This is the of, the most reliable and fastest biometric passport photo system. This user guide helps you in everyday use. Please check www.idstation.eu

More information

Challenges and Potential Research Areas In Biometrics

Challenges and Potential Research Areas In Biometrics Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la

More information

Contents and Preface of the RFID-Handbook

Contents and Preface of the RFID-Handbook Contents and Preface of the RFID-Handbook RFID-Handbook, Wiley & Sons LTD 1999 Radio-Frequency Identification: Fundamentals and Applications Klaus Finkenzeller, Munich, Germany ISBN 0-471-98851-0 Contents

More information

A. The purpose of this experiment is to find out what material will protect a credit

A. The purpose of this experiment is to find out what material will protect a credit I. What is RFID A. The purpose of this experiment is to find out what material will protect a credit card or tag from getting read by an RFID reader. What it means by read is the RFID scanner will send

More information

Delivering Reliability. Services. Strength You Can Count On. oldcastleprecast.com/services

Delivering Reliability. Services. Strength You Can Count On. oldcastleprecast.com/services Delivering Reliability A Strength You Can Count On SERVICES TENANT IMPROVEMENTS Above And Below Ground Solutions Strength You Can Count On Oldcastle Precast is well trained and knowledgeable in all aspects

More information

Forest Inventory System. User manual v.1.2

Forest Inventory System. User manual v.1.2 Forest Inventory System User manual v.1.2 Table of contents 1. How TRESTIMA works... 3 1.2 How TRESTIMA calculates basal area... 3 2. Usage in the forest... 5 2.1. Measuring basal area by shooting pictures...

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

Go Daddy Online Photo Filer

Go Daddy Online Photo Filer Getting Started and User Guide Discover an easier way to share, print and manage your photos online! Online Photo Filer gives you an online photo album site for sharing photos, as well as easy-to-use editing

More information

Image optimization guide

Image optimization guide Image Optimization guide for Image Submittal Images can play a crucial role in the successful execution of a book project by enhancing the text and giving the reader insight into your story. Although your

More information

Security Inspections are offered at no charge to Bunker Hill, Piney Point, and Hunters Creek residents.

Security Inspections are offered at no charge to Bunker Hill, Piney Point, and Hunters Creek residents. MEMORIAL VILLAGES POLICE DEPARTMENT 11981 Memorial Drive Houston, Texas 77024 (713) 365-3700 www.mvpdtx.org Serving the cities of Bunker Hill, Piney Point, and Hunters Creek Security Inspections As a resident

More information

Installation Manual. Ultra RF Analogue Transmitter QC0168. Manual Ref: QC0168. Version: March

Installation Manual. Ultra RF Analogue Transmitter QC0168. Manual Ref: QC0168. Version: March Installation Manual Ultra RF Analogue Transmitter QC0168 Manual Ref: QC0168 Version: March 17 1.0 System Concept RF Transmitters connect to sensors or meters and send data to the infrastructure internet

More information

DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING

DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING DISTINGUISHING USERS WITH CAPACITIVE TOUCH COMMUNICATION VU, BAID, GAO, GRUTESER, HOWARD, LINDQVIST, SPASOJEVIC, WALLING RUTGERS UNIVERSITY MOBICOM 2012 Computer Networking CptS/EE555 Michael Carosino

More information

SECTION 35 ANTENNAS AND TOWERS

SECTION 35 ANTENNAS AND TOWERS SECTION 35 ANTENNAS AND TOWERS Section: 515-35-1 Purpose and Intent 515-35-2 General Standards 515-35-3 Certification, Inspection and Maintenance 515-35-4 Tower Design 515-35-5 Co-Location Requirement

More information

Winthrop Primary School

Winthrop Primary School Winthrop Primary School Information Communication Technology Plan & Scope and Sequence (DRAFT) 2015 2016 Aim: To integrate across all Australian Curriculum learning areas. Classroom teachers delivering

More information

TurboVUi Solo. User Guide. For Version 6 Software Document # S Please check the accompanying CD for a newer version of this document

TurboVUi Solo. User Guide. For Version 6 Software Document # S Please check the accompanying CD for a newer version of this document TurboVUi Solo For Version 6 Software Document # S2-61432-604 Please check the accompanying CD for a newer version of this document Remote Virtual User Interface For MOTOTRBO Professional Digital 2-Way

More information

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Shannon Information theory, coding and biometrics. Han Vinck June 2013 Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:

More information

ELECTRICITY THEFT MONITORING AND ITS CONSUMPTION SAVINGS

ELECTRICITY THEFT MONITORING AND ITS CONSUMPTION SAVINGS ELECTRICITY THEFT MONITORING AND ITS CONSUMPTION SAVINGS Ms.V.Sellam 1, Saurav Chowdhury 2, MVS Vashishta 3, Anirudh Singh 4 1Asst. Prof, SRMIST,Chennai 2,3,4Student, SRMIST, Chennai ------------------------------------------------------------------------***-------------------------------------------------------------------------

More information

Video Intercom System Introduction

Video Intercom System Introduction Video Intercom System Introduction CONTENTS Application Products Installation Operation Video Intercom System Service for residential area, Provide two-way video/audio call between visitors and residents,

More information

Wombat Security s Beyond the Phish. Report. security technologies. #BeyondthePhish

Wombat Security s Beyond the Phish. Report. security technologies. #BeyondthePhish Wombat Security s 2016 Beyond the Phish Report security technologies #BeyondthePhish Beyond the Phish As our State of the Phish Report reinforced earlier this year phishing is still a large and growing

More information

4. BASIC OPERATION AND DESCRIPTION

4. BASIC OPERATION AND DESCRIPTION 3. FEATURES Rugged high-impact plastic enclosure with aluminum sensor pole Powerful magnetic speaker with waterproof Mylar cone Lightweight, comfortably balanced for easy handling Easy view LCD display

More information

SPS1M-EVK. SPS1M-EVK Battery Free Wireless Sensor Handheld Evaluation System EVAL BOARD USER S MANUAL

SPS1M-EVK. SPS1M-EVK Battery Free Wireless Sensor Handheld Evaluation System EVAL BOARD USER S MANUAL SPS1M-EVK SPS1M-EVK Battery Free Wireless Sensor Handheld Evaluation System EVAL BOARD USER S MANUAL Introduction This guide describes how to use the Handheld Evaluation System to carry out sensor measurements

More information

Getting Started. Click the Start New Measurement Button. Select Year. Select Make. Select Model. If correct vehicle is selected, click next.

Getting Started. Click the Start New Measurement Button. Select Year. Select Make. Select Model. If correct vehicle is selected, click next. Revised 05/04/2006 Index Getting Started 3 Choose point to measure From 4 Choose point to measure To 5,6 Selecting points under hood 6 Measuring 7 Calibrate Tram 8 Follow LCD Screen/Tram Operation 8,9

More information

University of California, Santa Barbara. CS189 Fall 17 Capstone. VR Telemedicine. Product Requirement Documentation

University of California, Santa Barbara. CS189 Fall 17 Capstone. VR Telemedicine. Product Requirement Documentation University of California, Santa Barbara CS189 Fall 17 Capstone VR Telemedicine Product Requirement Documentation Jinfa Zhu Kenneth Chan Shouzhi Wan Xiaohe He Yuanqi Li Supervised by Ole Eichhorn Helen

More information

STATE OF OHIO DEPARTMENT OF TRANSPORTATION SUPPLEMENTAL SPECIFICATION 919 RAILROAD PREEMPTION INTERFACE. January 15, 2016

STATE OF OHIO DEPARTMENT OF TRANSPORTATION SUPPLEMENTAL SPECIFICATION 919 RAILROAD PREEMPTION INTERFACE. January 15, 2016 STATE OF OHIO DEPARTMENT OF TRANSPORTATION SUPPLEMENTAL SPECIFICATION 919 RAILROAD PREEMPTION INTERFACE January 15, 2016 919.01 Traffic Signal Cabinet and Controller Unit General Requirements 919.02 Approved

More information

RFID and privacy - Some industry perspectives (ICC, EICTA)

RFID and privacy - Some industry perspectives (ICC, EICTA) RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris 2005-10-05 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services.

More information

An Escape Room set in the world of Assassin s Creed Origins. Content

An Escape Room set in the world of Assassin s Creed Origins. Content An Escape Room set in the world of Assassin s Creed Origins Content Version Number 2496 How to install your Escape the Lost Pyramid Experience Goto Page 3 How to install the Sphinx Operator and Loader

More information

Administration Guide. BBM Enterprise on BlackBerry UEM

Administration Guide. BBM Enterprise on BlackBerry UEM Administration Guide BBM Enterprise on BlackBerry UEM Published: 2018-08-17 SWD-20180817150112896 Contents Managing BBM Enterprise in BlackBerry UEM... 5 User and device management...5 Activating users...

More information

RED TACTON ABSTRACT:

RED TACTON ABSTRACT: RED TACTON ABSTRACT: Technology is making many things easier. We can say that this concept is standing example for that. So far we have seen LAN, MAN, WAN, INTERNET & many more but here is new concept

More information

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com Layerone / 2006 RFID Technology, Security & Privacy Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com What are we talking about today? RFID history Technologies WiFi tags Privacy/ Security Who am

More information

SUPERIOR SECURITY - ANSI Grade 1 Deadbolt* - Heavy Duty Commercial Security - BumpGuard protects against lock bumping**

SUPERIOR SECURITY - ANSI Grade 1 Deadbolt* - Heavy Duty Commercial Security - BumpGuard protects against lock bumping** Kwikset s SmartKey is a technological innovation that provides superior security. It also provides you the flexibility of re-keying your own locks, yourself, quickly & easily without removing them from

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

Version: 2.0 Date: 5/31/ :07:00 AM

Version: 2.0 Date: 5/31/ :07:00 AM Weavefuture Coin Op Internet Café Kiosk System 2.0 Version: 2.0 Date: 5/31/2007 12:07:00 AM Table of Contents 1 WEAVEFUTURE COIN OP INTERNET CAFÉ KIOSK SYSTEM COMPOSITION... 3 2 WEAVEFUTURE COIN ACCEPTOR

More information

Step 3- Creating A Good Work Flow Floor Plan For Faster Production And Creating Process Manuals

Step 3- Creating A Good Work Flow Floor Plan For Faster Production And Creating Process Manuals Step 3- Creating A Good Work Flow Floor Plan For Faster Production And Creating Process Manuals Creating A Well-Organized Floor Plan In Step I talked about Goals, Planning and your current Financial Status.

More information

INCLINED PLANE RIG LABORATORY USER GUIDE VERSION 1.3

INCLINED PLANE RIG LABORATORY USER GUIDE VERSION 1.3 INCLINED PLANE RIG LABORATORY USER GUIDE VERSION 1.3 Labshare 2011 Table of Contents 1 Introduction... 3 1.1 Remote Laboratories... 3 1.2 Inclined Plane - The Rig Apparatus... 3 1.2.1 Block Masses & Inclining

More information

Physical Inventory System User Manual. Version 19

Physical Inventory System User Manual. Version 19 Physical Inventory System User Manual Version 19 0 Physical Inventory System User Manual 1 Table of Contents 1. Prepare for Physical Inventory... 2. Chapter 1: Starting Inventory... 2.1. CDK/ADP... 3.

More information

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date: Proposal # xxxxxxxxxxxx Intercept Jammer Date: Presented From: HSS Development 75 S. Broadway White Plains, NY 060 Office: 94-304-4333 www.secintel.com New York Disclaimers: All descriptions of HSS products

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

DESIGN AND DEVELOPMENT OF A MICROCONTROLLER BASED WIRELESS SECURITY ACCESS SYSTEM

DESIGN AND DEVELOPMENT OF A MICROCONTROLLER BASED WIRELESS SECURITY ACCESS SYSTEM DESIGN AND DEVELOPMENT OF A MICROCONTROLLER ASED WIRELESS SECURITY ACCESS SYSTEM 1 Adewale A. A., 2 Abdulkareem A., 3 Agbetuyi A. F., 4 Dike Ike Department of Electrical and Information Engineering, Covenant

More information

Student Quick Guide. Accessing your Examity Dashboard

Student Quick Guide. Accessing your Examity Dashboard Student Quick Guide Accessing your Examity Dashboard Access your Examity dashboard at https://prod.examity.com/otis by logging in with credentials provided. This will bring you to your Examity dashboard.

More information

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019 Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 EISSN: 1998-1090 2016November10(16):pages 129-137 Published BYAENSI Publication http://www.aensiweb.com/anas Open Access Journal Design and Implementation

More information

K40 Consult. Don t like to read manuals? Call our experienced K40 Consultants. We ll explain the whole thing

K40 Consult. Don t like to read manuals? Call our experienced K40 Consultants. We ll explain the whole thing K40 Consult Don t like to read manuals? Call our experienced K40 Consultants. We ll explain the whole thing. 800.323.5608 K40 ELECTRONICS 600 Tollgate Rd., Suite A Elgin, IL 60123 www.k40.com Table of

More information

Speaking Notes for Grades 4 to 6 Presentation

Speaking Notes for Grades 4 to 6 Presentation Speaking Notes for Grades 4 to 6 Presentation Understanding your online footprint: How to protect your personal information on the Internet SLIDE (1) Title Slide SLIDE (2) Key Points The Internet and you

More information

ARUBA AS-100 WIRELESS SENSOR

ARUBA AS-100 WIRELESS SENSOR Multivendor, Remote Management for Aruba Bluetooth Low Energy Beacons Aruba Mobile Engagement enables venues to engage with visitors mobile devices using Aruba Beacons powered by Bluetooth Low Energy (BLE)

More information

0420 COMPUTER STUDIES

0420 COMPUTER STUDIES CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education MARK SCHEME for the May/June 2013 series 0420 COMPUTER STUDIES 0420/13 Paper 1, maximum raw mark 100 This mark

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Child Check In Frequently Asked Questions

Child Check In Frequently Asked Questions Child Check In Frequently Asked Questions Does Child Check In print to label printers (like Dymo)? Does Child Check In also print badges for the workers? How are the badges worn? How are the badges reused?

More information

Keycards come with an imbedded RFID chip and antenna, there is no battery in the keycards. The keycards are encrypted and only

Keycards come with an imbedded RFID chip and antenna, there is no battery in the keycards. The keycards are encrypted and only Index Keycards 02 The following is a description of the type of Keycards and function 03 Programming and Initialization of the RFID Lock 04 Procedure for Initialization 05 Programming- Adding Keycards

More information

Dermalog Gate. The next generation gate Made in Germany. v_1.0_171012

Dermalog Gate. The next generation gate Made in Germany. v_1.0_171012 Dermalog Gate The next generation gate Made in Germany. v_1.0_171012 Contents 03 Welcome to the World of DERMALOG. 02 Welcome to the world of DERMALOG The Biometrics Innovation Leader. As a pioneer in

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

PaperCut VCA Cash Acceptor Manual

PaperCut VCA Cash Acceptor Manual PaperCut VCA Cash Acceptor Manual Contents 1 Introduction... 2 2 How PaperCut interfaces with the VCA... 2 3 Setup Phase 1: Device/Hardware Setup... 3 3.1 Networking/Firewall Configuration... 3 3.2 IP

More information

inphoto ID Canon camera control software Automatic ID photography User Guide

inphoto ID Canon camera control software Automatic ID photography User Guide inphoto ID Canon camera control software Automatic ID photography User Guide 2008 Akond company 197342, Russia, St.-Petersburg, Serdobolskaya, 65A Phone/fax: +7(812)600-6918 Cell: +7(921)757-8319 e-mail:

More information

Arduino Hacking Village THOTCON 0x9

Arduino Hacking Village THOTCON 0x9 RFID Lock Analysis Lab Use an Oscilloscope to view RFID transponder signals Use an Arduino to capture and decode transponder signals Use Arduino to spoof a transponder Lab time: 10 minutes Lab 1: Viewing

More information

iphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book.

iphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book. iphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book. 1 Contents Chapter 1 3 Welcome to iphoto 3 What You ll Learn 4 Before

More information

DataCAD 18 Softlock. Universal Installer. Installation. Evaluation

DataCAD 18 Softlock. Universal Installer. Installation. Evaluation DataCAD 18 Softlock DataCAD 18 uses a software-based license management option, referred to as a softlock, in lieu of the hardware-based USB license key, or hardlock used by older versions. Each DataCAD

More information

2009 Michigan Educational Technology Standards - Grades 6-8

2009 Michigan Educational Technology Standards - Grades 6-8 GLCE Language 1 BASIC OPERATIONS AND CONCEPTS 1. Creativity and Innovation Students demonstrate creative thinking, construct knowledge, and develop innovative products and processes using technology. Students

More information

Tomb Raider 3 Playstation Demo Walkthrough

Tomb Raider 3 Playstation Demo Walkthrough Tomb Raider 3 Playstation Demo Walkthrough By Dr Kirk Lara is in a cell in Area 51, with the door locked and an MP outside. Go to the window and climb up to fetch the small medipak. This will set off the

More information

USER MANUAL FIELDBEE AND RTK BEE STATION FULL VERSION. WE PROVIDE ONLINE SUPPORT: VERSION 1.0.

USER MANUAL FIELDBEE AND RTK BEE STATION FULL VERSION. WE PROVIDE ONLINE SUPPORT:  VERSION 1.0. USER MANUAL FULL VERSION VERSION 1.0. FIELDBEE AND RTK BEE STATION WE PROVIDE ONLINE SUPPORT: support@efarmer.mobi info@efarmer.mobi CONTENTS TABLE OF CONTENTS INTRODUCTION... 3 3 WAYS OF USING FIELDBEE...

More information

WiFi Installations : Frequently Asked Questions

WiFi Installations : Frequently Asked Questions Thank you for downloading our WiFi FAQ, we constructed this guide in order to aid you choosing and selecting the best solution to your WiFi range issues or for setting up a between building or a point

More information

Field Device Manager Express

Field Device Manager Express Honeywell Process Solutions Field Device Manager Express Software Installation User's Guide EP-FDM-02430X R430 June 2012 Release 430 Honeywell Notices and Trademarks Copyright 2010 by Honeywell International

More information

KM-4800w. Copy/Scan Operation Manual

KM-4800w. Copy/Scan Operation Manual KM-4800w Copy/Scan Operation Manual NOTE: This Operation Manual contains information that corresponds to using both the metric and inch versions of these machines. The metric versions of these machines

More information

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard 1 Fahad Al Mannai IT 104 C01 7/8/2016 Biometrics Authentication: An Emerging IT Standard "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code onhttp://oai.gmu.edu/the-mason-honor-code-2/

More information

Hytera. PD41X Patrol Management System. Installation and Configuration Guide

Hytera. PD41X Patrol Management System. Installation and Configuration Guide Hytera PD41X Patrol Management System Installation and Configuration Guide Documentation Version: 01 Release Date: 03-2015 Copyright Information Hytera is the trademark or registered trademark of Hytera

More information

ClearClick Virtuoso. 22MP Film & Slide Scanner. Quick Start Guide & User s Manual

ClearClick Virtuoso. 22MP Film & Slide Scanner. Quick Start Guide & User s Manual ClearClick Virtuoso 22MP Film & Slide Scanner Quick Start Guide & User s Manual This document 2016 ClearClick Software LLC. All rights reserved. Do not reproduce in any form without permission. Register

More information

We have all of this Affordably NOW! Not months and years down the road, NOW!

We have all of this Affordably NOW! Not months and years down the road, NOW! PROXCOMM INFORMS The Smartphone Engagement Tool The Uses of Proximity Beacons, Tracking, Analytics & QR Codes. Knowing Who Walks Through Your Doors & Facility, Then Reaching Them How do users interact

More information

WCS-D5100 Programming Software for the Icom ID-5100 Data

WCS-D5100 Programming Software for the Icom ID-5100 Data WCS-D5100 Programming Software for the Icom ID-5100 Data Memory Types (left to right) Memories Limit Memories DR Memories Call Channels GPS Memories Receive Frequency Transmit Frequency Offset Frequency

More information

iphoto Objective Course Outline

iphoto Objective Course Outline iphoto Objective In this class participants will learn how iphoto creates a photo center for photo organization by using rolls and albums. Participants will also learn the built-in editing tools. Participants

More information

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS 1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION

More information

Everything you need to know

Everything you need to know Everything you need to know If you have any questions then give us a call on 0845 454 2222* or call free on 150 from a Virgin Media phone *For details on how much it costs to call our team, visit our website

More information

SATELLITE RADIO/TELEPHONE

SATELLITE RADIO/TELEPHONE A Unique and Powerful Communications System NETWORK INNOVATIONS SATELLITE RADIO/TELEPHONE (FORMERLY SKYTERRA, MSV, LIGHT SQUARED ) Secure Communications 1. The network employs the IMBE (Improved Multi-Band

More information

RFID Integrated Teacher Monitoring

RFID Integrated Teacher Monitoring RFID Integrated Teacher Monitoring Introduction Article by Adewopo Adeniyi M.Sc, Texila American University, Nigeria Email: preciousadewopon@yahoo.com Radio Frequency Identification (RFID) is a generic

More information

Key & Access Policy - DRAFT

Key & Access Policy - DRAFT Applies to Electronic Access Applies to Physical Keys Key & Access Policy - DRAFT General Provisions Provisions in this policy apply to all non-residential facilities for the campus. Keys for residential

More information

Family Feud Using PowerPoint - Demo Version

Family Feud Using PowerPoint - Demo Version Family Feud Using PowerPoint - Demo Version Training Handout This Handout Covers: Overview of Game Template Layout Setting up Your Game Running Your Game Developed by: Professional Training Technologies,

More information

1040 DPI High Resolution Full-page epassport Reader Regula 8703

1040 DPI High Resolution Full-page epassport Reader Regula 8703 1040 DPI High Resolution Full-page epassport Reader Regula 8703 The world`s first mobile true high resolution full-page epassport reader featuring 1040 DPI resolution. Automatic reading and authenticity

More information

Quick Start Guide Hardware

Quick Start Guide Hardware Quick Start Guide Hardware The BroadWeigh shackle can be used almost exactly as a normal shackle with a few additional considerations. It is worth noting that the strain gauge is located within the shackle

More information

Password-less Behaviometrics Authentication on Touchscreen Devices

Password-less Behaviometrics Authentication on Touchscreen Devices Password-less Behaviometrics Authentication on Overview Researchers at Ohio University have developed a novel, secure, single-factor, behavioral biometric user authentication that is compatible with virtually

More information

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam.

From here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam. Student Quick Guide Accessing Examity You can easily access Examity through Canvas. First, login to your course in Canvas, then click on the Examity link. This will bring you to your Examity dashboard.

More information

Abstract Games Issue 9 Spring 2002

Abstract Games Issue 9 Spring 2002 1 of 8 8/29/2008 10:02 AM Abstract Games Issue 9 Spring 2002 ealm is a wonderful and unique two-person abstract strategy game. It involves capturing territory and blocking and immobilizing the other player's

More information

Wireless Keyboard Without Need For Battery

Wireless Keyboard Without Need For Battery Technical Disclosure Commons Defensive Publications Series April 29, 2015 Wireless Keyboard Without Need For Battery Vijay Asrani James Tanner Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

(stolen from the wiki NumberTags#Programming_Number_Tags )

(stolen from the wiki  NumberTags#Programming_Number_Tags ) Introduction This is intended to be a supplementary manual for the use of the Uniden BCD396XT and BCD996XT scanners that have been introduced. Since introduction, there has been a wide observance that

More information

OEM 100. User Manual. Figure 1: OEM 100 Module with HG Rectangular Antenna Board

OEM 100. User Manual. Figure 1: OEM 100 Module with HG Rectangular Antenna Board OEM 100 User Manual Figure 1: OEM 100 Module with HG Rectangular Antenna Board Revision History Revision History Release Version Date Revision Description Authors Version 1.0 07/20/09 Initial Release Bryan

More information