Category Archives: HRFS Tech

  • -

How to Enable/Disable User Account Control Using Group Policy ANZ Tech Computer Repair and CCTV Sales and Camera Installation in Manukau South Auckland Cheap Good Quality Camera CCTV System in South Auckland

Disable User Account Control Using Group Policy

We will create a group policy and define the settings to disable the UAC.

First open the Server Manager Console and click on Tools. Now click Group Policy Management from the drop down. Right click on the domain and click on Create a GPO in this domain and link it here. Provide a suitable name to the GPO and right click the policy and click on Edit.

hrfs tech - Disable-User-Account-Control-Using-Group-Policy-

In the GPMC editor click on Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > Security Options. On the right pane there are lot of settings that you see, so you need to modify the following policies.

1) User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode = Right click policy setting, click Properties. Check the box Define this policy setting and choose Elevate without prompting.

2) User Account Control: Detect application installations and prompt for elevation = Right click policy setting, click Properties. Check the box Define this policy setting and choose Disabled.

3) User Account Control: Run all administrators in Admin Approval Mode = Right click policy setting, click Properties. Check the box Define this policy setting and choose Disabled.

hrfstech group policy change

Run gpupdate /force on Windows client machine. The logged on users might see a notification that a restart is required to turn off user account control. After the restart of the client machine you will see that UAC is set to Never notify on the client machine.

2 hrfs tech - Disable-User-Account-Control-Using-Group-Policy-

 

Enable User Account Control Using Group Policy

Recommended to do following to keep it enabled always..

UAC Group Policy Settings and Registry Key Settings

Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2

Group Policy settings

 
 There are 10 Group Policy settings that can be configured for User Account Control (UAC). The table lists the default for each of the policy settings, and the following sections explain the different UAC policy settings and provide recommendations. These policy settings are located in Security Settings\Local Policies\Security Options in the Local Security Policy snap-in. For more information about each of the Group Policy settings, see the Group Policy description. For information about the registry key settings, 

 

Group Policy setting Registry key Default

User Account Control: Admin Approval Mode for the built-in Administrator account

FilterAdministratorToken

Disabled

User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop

EnableUIADesktopToggle

Disabled

User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode

ConsentPromptBehaviorAdmin

Prompt for consent for non-Windows binaries

User Account Control: Behavior of the elevation prompt for standard users

ConsentPromptBehaviorUser

Prompt for credentials on the secure desktop

User Account Control: Detect application installations and prompt for elevation

EnableInstallerDetection

Enabled (default for home)

Disabled (default for enterprise)

User Account Control: Only elevate executables that are signed and validated

ValidateAdminCodeSignatures

Disabled

User Account Control: Only elevate UIAccess applications that are installed in secure locations

EnableSecureUIAPaths

Enabled

User Account Control: Run all administrators in Admin Approval Mode

EnableLUA

Enabled

User Account Control: Switch to the secure desktop when prompting for elevation

PromptOnSecureDesktop

Enabled

User Account Control: Virtualize file and registry write failures to per-user locations

EnableVirtualization

Enabled

User Account Control: Admin Approval Mode for the built-in Administrator account

 

The User Account Control: Admin Approval Mode for the built-in Administrator account policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account.

The options are:

  • Enabled. The built-in Administrator account uses Admin Approval Mode. By default, any operation that requires elevation of privilege will prompt the user to approve the operation.
  • Disabled. (Default) The built-in Administrator account runs all applications with full administrative privilege.
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop

 

The User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user.

The options are:

  • Enabled. UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the User Account Control: Switch to the secure desktop when prompting for elevation policy setting, the prompts appear on the interactive user’s desktop instead of the secure desktop.
  • Disabled. (Default) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the User Account Control: Switch to the secure desktop when prompting for elevation policy setting.

UIA programs are designed to interact with Windows and application programs on behalf of a user. This policy setting allows UIA programs to bypass the secure desktop to increase usability in certain cases; however, allowing elevation requests to appear on the interactive desktop instead of the secure desktop can increase your security risk.

UIA programs must be digitally signed because they must be able to respond to prompts regarding security issues, such as the UAC elevation prompt. By default, UIA programs are run only from the following protected paths:

  • …\Program Files, including subfolders
  • …\Program Files (x86), including subfolders for 64-bit versions of Windows
  • …\Windows\System32

The User Account Control: Only elevate UIAccess applications that are installed in secure locations policy setting disables the requirement to be run from a protected path.

While this policy setting applies to any UIA program, it is primarily used in certain remote assistance scenarios, including the Windows Remote Assistance program in Windows 7.

If a user requests remote assistance from an administrator and the remote assistance session is established, any elevation prompts appear on the interactive user’s secure desktop and the administrator’s remote session is paused. To avoid pausing the remote administrator’s session during elevation requests, the user may select the Allow IT Expert to respond to User Account Control prompts check box when setting up the remote assistance session. However, selecting this check box requires that the interactive user respond to an elevation prompt on the secure desktop. If the interactive user is a standard user, the user does not have the required credentials to allow elevation.

If you enable this policy setting, requests for elevation are automatically sent to the interactive desktop (not the secure desktop) and also appear on the remote administrator’s view of the desktop during a remote assistance session. This allows the remote administrator to provide the appropriate credentials for elevation.

This policy setting does not change the behavior of the UAC elevation prompt for administrators.

If you plan to enable this policy setting, you should also review the effect of the User Account Control: Behavior of the elevation prompt for standard users policy setting. If it is configured as Automatically deny elevation requests, elevation requests are not presented to the user.

User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode

 

The User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode policy setting controls the behavior of the elevation prompt for administrators.

The options are:

  • Elevate without prompting. Allows privileged accounts to perform an operation that requires elevation without requiring consent or credentials.
    noteNote
    Use this option only in the most constrained environments.
  • Prompt for credentials on the secure desktop. When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a privileged user name and password. If the user enters valid credentials, the operation continues with the user’s highest available privilege.
  • Prompt for consent on the secure desktop. When an operation requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.
  • Prompt for credentials. When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
  • Prompt for consent. When an operation requires elevation of privilege, the user is prompted to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.
  • Prompt for consent for non-Windows binaries. (Default) When an operation for a non-Microsoft application requires elevation of privilege, the user is prompted on the secure desktop to select either Permit or Deny. If the user selects Permit, the operation continues with the user’s highest available privilege.
User Account Control: Behavior of the elevation prompt for standard users

 

The User Account Control: Behavior of the elevation prompt for standard users policy setting controls the behavior of the elevation prompt for standard users.

The options are:

  • Automatically deny elevation requests. When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
  • Prompt for credentials on the secure desktop. (Default) When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
  • Prompt for credentials. When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
User Account Control: Detect application installations and prompt for elevation

 

The User Account Control: Detect application installations and prompt for elevation policy setting controls the behavior of application installation detection for the computer.

The options are:

  • Enabled. (Default for home) When an application installation package is detected that requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
  • Disabled. (Default for enterprise) Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary.
User Account Control: Only elevate executables that are signed and validated

 

The User Account Control: Only elevate executables that are signed and validated policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers.

The options are:

  • Enabled. Enforces the PKI certification path validation for a given executable file before it is permitted to run.
  • Disabled. (Default) Does not enforce PKI certification path validation before a given executable file is permitted to run.
User Account Control: Only elevate UIAccess applications that are installed in secure locations

 

The User Account Control: Only elevate UIAccess applications that are installed in secure locations policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following:

  • …\Program Files, including subfolders
  • …\Windows\system32
  • …\Program Files (x86), including subfolders for 64-bit versions of Windows
noteNote
Windows enforces a PKI signature check on any interactive application that requests to run with a UIAccess integrity level regardless of the state of this security setting.

The options are:

  • Enabled. (Default) If an application resides in a secure location in the file system, it runs only with UIAccess integrity.
  • Disabled. An application runs with UIAccess integrity even if it does not reside in a secure location in the file system.
User Account Control: Run all administrators in Admin Approval Mode

 

The User Account Control: Run all administrators Admin Approval Mode policy setting controls the behavior of all UAC policy settings for the computer. If you change this policy setting, you must restart your computer.

The options are:

  • Enabled. (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
  • Disabled. Admin Approval Mode and all related UAC policy settings are disabled.
    noteNote
    If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
User Account Control: Switch to the secure desktop when prompting for elevation

 

The User Account Control: Switch to the secure desktop when prompting for elevation policy setting controls whether the elevation request prompt is displayed on the interactive user’s desktop or the secure desktop.

The options are:

  • Enabled. (Default) All elevation requests go to the secure desktop regardless of prompt behavior policy settings for administrators and standard users.
  • Disabled. All elevation requests go to the interactive user’s desktop. Prompt behavior policy settings for administrators and standard users are used.

When this policy setting is enabled, it overrides the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode policy setting. The following table describes the behavior of the elevation prompt for each of the administrator policy settings when the User Account Control: Switch to the secure desktop when prompting for elevation policy setting is enabled or disabled.

 

Administrator policy setting Enabled Disabled

Prompt for credentials on the secure desktop

The prompt appears on the secure desktop.

The prompt appears on the secure desktop.

Prompt for consent on the secure desktop

The prompt appears on the secure desktop.

The prompt appears on the secure desktop.

Prompt for credentials

The prompt appears on the secure desktop.

The prompt appears on the interactive user’s desktop.

Prompt for consent

The prompt appears on the secure desktop.

The prompt appears on the interactive user’s desktop.

Prompt for consent for non-Windows binaries

The prompt appears on the secure desktop.

The prompt appears on the interactive user’s desktop.

When this policy setting is enabled, it overrides the User Account Control: Behavior of the elevation prompt for standard users policy setting. The following table describes the behavior of the elevation prompt for each of the standard user policy settings when theUser Account Control: Switch to the secure desktop when prompting for elevation policy setting is enabled or disabled.

 

Standard user policy setting Enabled Disabled

Automatically deny elevation requests

No prompt. The request is automatically denied.

No prompt. The request is automatically denied.

Prompt for credentials on the secure desktop

The prompt appears on the secure desktop.

The prompt appears on the secure desktop.

Prompt for credentials

The prompt appears on the secure desktop.

The prompt appears on the interactive user’s desktop.

User Account Control: Virtualize file and registry write failures to per-user locations

 

The User Account Control: Virtualize file and registry write failures to per-user locations policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software.

The options are:

  • Enabled. (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry.
  • Disabled. Applications that write data to protected locations fail.
Registry key settings

 
 

The registry keys are found in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. For information about each of the registry keys, see the associated Group Policy description.

 

Registry Key Group Policy setting Registry settings

FilterAdministratorToken

User Account Control: Admin Approval Mode for the built-in Administrator account

0 (Default) = Disabled

1 = Enabled

EnableUIADesktopToggle

User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop

0 (Default) = Disabled

1 = Enabled

ConsentPromptBehaviorAdmin

User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode

0 = Elevate without prompting

1 = Prompt for credentials on the secure desktop

2 = Prompt for consent on the secure desktop

3 = Prompt for credentials

4 = Prompt for consent

5 (Default) = Prompt for consent for non-Windows binaries

ConsentPromptBehaviorUser

User Account Control: Behavior of the elevation prompt for standard users

0 = Automatically deny elevation requests

1 = Prompt for credentials on the secure desktop

3 (Default) = Prompt for credentials

EnableInstallerDetection

User Account Control: Detect application installations and prompt for elevation

1 = Enabled (default for home)

0 = Disabled (default for enterprise)

ValidateAdminCodeSignatures

User Account Control: Only elevate executables that are signed and validated

0 (Default) = Disabled

1 = Enabled

EnableSecureUIAPaths

User Account Control: Only elevate UIAccess applications that are installed in secure locations

0 = Disabled

1 (Default) = Enabled

EnableLUA

User Account Control: Run all administrators in Admin Approval Mode

0 = Disabled

1 (Default) = Enabled

PromptOnSecureDesktop

User Account Control: Switch to the secure desktop when prompting for elevation

0 = Disabled

1 (Default) = Enabled

EnableVirtualization

User Account Control: Virtualize file and registry write failures to per-user locations

0 = Disabled

1 (Default) = Enabled


  • -

How to Enable Pin Sign-in For Domain Users on Windows 7/8/10 – South West Auckland Computer Support Repair

How to Enable Pin Sign-in For Domain Users on Windows 8 – South West Auckland Computer Support Repair

How to Enable Pin Sign-in For Domain Users on Windows 7/8/10

Domain users are not allowed to sign in with a Pin by default. However, using a little bit of GPO, we can change that.

Press the Win + R keyboard combination to open a run box then type “gpedit.msc” and press enter.

image

When the Group Policy editor opens, navigate to:

Computer Configuration\Administrative Templates\System\Logon

image

On the right hand side, double click on the “Turn on PIN sign-in” setting.

image

Now switch the radio button from Not Configured to Enabled, then click Apply.

image

Once the setting has been activated, you need to refresh your current Group Policy settings. To do that, open a run box using the Win + R keyboard combo and type the following, then press enter.

gpupdate /force

image

Of course, this will only be useful in a domain environment, in which case you could assign this group policy setting to an OU in Active Directory. That’s all there is to it.


  • -

South Auckland Cheap Computer Fix Henderson, Avandale, West Auckland, New Lynn, Henderson, Henderson Computer Technician Repair, West Auckland Computer Repair Fix, Cheap Computer Repair, New Lynn Local Computer Repair, Computer Services in Papatoetoe, Waitakare City, Henderson, Cheap Laptop Repair | Affordable Computer Repair | Computer Not Working Henderson Fix

Cheap Computer Fix Henderson, Avandale, West Auckland, New Lynn, Henderson, Henderson Computer Technician Repair, West Auckland Computer Repair Fix, Cheap Computer Repair, New Lynn Local Computer Repair, Computer Services in Papatoetoe, Waitakare City, Henderson, Cheap Laptop Repair | Affordable Computer Repair | Computer Not Working Henderson Fix

Category : ANZ Tech

Manukau Computer Repairs Auckland Central – Parnell – New Market – Remuera – Epsom – Mission Bay – St Heliers

Computer Repair – PC Repair in West Auckland,  Henderson Computer Repair

Computer Repair in Hendreson 09 390 9555 – Waitakare City Computer Repairs

Computer Services in New Lynn, Avandale

Good PCc repair company in Henderson Mobile: 027 ANZ Tech (027 269 8324)   Support: 24/7

All Call-outs are available. Only pay $2 for 10k distance! no extra charge for call out

No technical language
Top quality service
Easy to understand advice
Business server & network installations
Business workstation installations, setup & repairs
Home PC & network installations, setup & repairs
Virus & spyware removal services
Virus & spyware prevention solutions
computer repair, maintenance & upgrade services…

Computer repairs and upgrades
Computer maintenance
Computer health checks
Windows blue screen errors fixed
Computer performance problems resolved
Hardware and software installations

Ph: 09 270 8008

 

 

Yes, we have local based Engineer in Henderson. Our engineer Bhusan looks after all mobile jobs in West Auckland.

We have mobile engineers who visit your sites to fix your computer gears. We do not charge any call-outs as we are mobiled.

If you are not satisfied with our services you will not pay a cent. No questions asked.

– Satisfaction Guarantee

Same Day Response If your job is urgent we will be on-site in a couple of hours, not days.

Give us a ring, and try us, you will be our permanent customers!

Land Line: 09 270 8008

Mobile: 027 ANZ Tech (027 269 8324)

Support: support@hrfstech.co.nz

2 total views, no views today



Cheap Computer Fix Manukau, South Auckland, FlatBush, Otara, Mangere, Auckland Computer Repair Fix, Cheap Computer Repair, Manukau Local Computer Repair, Computer Services in Papatoetoe, Manukau, Cheap Laptop Repair | Affordable Computer Repair | Computer Not Working Manukau Fix

Category : ANZ Tech

We have mobile engineers who visit your sites to fix your computer gears. We do not charge any call-outs as we are mobiled.

Customers found us very professional and honest. Our prices are almost 50% lower than other earlier visits for the same professional services, we even offermore discount for some software and repairs. Customers are very surprised with our affordable price for the service.

If you are not satisfied with our services you will not pay a cent. No questions asked.

– Satisfaction Guarantee

Same Day Response If your job is urgent we will be on-site in a couple of hours, not days.

Give us a ring, and try us, you will be our permanent customers!

Land Line: 09 270 8008

Mobile: 027 ANZ Tech (027 269 8324)

Support: support@hrfstech.co.nz

Others: info@hrfstech.co.nz

 

Keyword: 

Cheap Computer Fix Manukau, South Auckland, FlatBush, Otara, Mangere, Auckland Computer Repair Fix, Cheap Computer Repair, Manukau Local Computer Repair, Computer Services in Papatoetoe, Manukau, Cheap Laptop Repair | Affordable Computer Repair | Computer Not Working Manukau Fix

2 total views, no views today



Computer Tech in Manukau Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD

Category : ANZ Tech

hrfstech computer repair laptop desktop repair

 

 

 

 

 

 

 

 

 

 

 

 

Computer repair services include:
Business IT Support services include:
Computer freezes or is too slow
On site consultant
Computer won’t shut down or start up On Site support
Keep crashing or blue screen Remote access support
PC will not boot or needs repair service Hardware and software outsource
Cannot access email or Internet System crashed help
Computer needs repair on site Server setup/configuration/repair
Printer is not working Office network Setup/config/repair
PC has a virus, spyware, pop-ups Data backup / recovery
Software is not running properly Network security
PC power, motherboard, HD is broken Ongoing support & training
computer operating system issues Virus / spyware removal
Remove all viruses and spyware OS Windows Upgrades XP to 7/ 8
Install critical updates I.T Training and Consultations
Perform optimization for faster speed.
  • Laptop Repair in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Desktop Repair in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Computer,Mobile and Tablet Repairs Mt. Wellington Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Clean My PC in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Clean My Desktop in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Clean My Laptop in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • PC Pop up (popup) in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Clean My PC in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Microsoft Word, Excel, Office Program in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Fix My Internet (not working) in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Computer/PC/Laptop Clean up Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • New Windows Installs, Format My Windows in Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
  • Free Software Intalls (Office+Excel) in Manukau 09 390 9555, Auckland (AKL), Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD
keyword:
Manukau 09 390 9555, Auckland, Papatoetoe, Otahuhu, Otara, Mount Wellington, Mangere, Ellerslie, Panmure, Auckland CBD

86 total views, no views today



Auckland Security Cameras South Auckland – Manurewa Otara, Panmure Mount Wellington Manukau CCTV installs in Auckland, Manukau CCTV install, Otahuhu, Ellerslie, Panmure, Penrose, Onehunga, North Shore, St Heliers, Mount Wellington

Category : ANZ Tech

Manukau CCTV installs in Auckland, Manukau, Otahuhu, Ellerslie, Panmure, Penrose, Onehunga, North Shore, St Heliers, Mount Wellington hrfstech hrfs tech limited

Best IP CCTV Systems

Technical Specs:

Features

■ 4pcs VG130151HIPC
1. 1.3 Megapixel, 1/3″ CMOS
2.  Compression: H.264
3.  M12 3.6mm/6mm lens
4.  36pcs IR LED, IR LED Distance 30m
■ 1pc H.264  Network Video Recorder
1. 4CH 720P,  4CH 960P, 2CH 1080P
2. Compression: H.264
3. 1CH HDMI, 1CH VGA Output
4. Live Display Resolution: 1920*1080 1440*900 1366*768
1280*1024 1024*768 800*600
5. HDD: 1 SATA, Max 3TB, 2USB
6. Support P2P, ONVIF
7. Playback: 1CH 720P
■ 1pc Power Supply: 15V  4A
■ 4pcs 20m Net Cable
■ 1pc Mouse

Specifications:

Kit package Contents:
KIT Model No.
VG-NVR19AK
NVR
1pc
IP Camera
4pcs
NVR Power supply
1pc
Network Cable
4pcs(20m)
Mouse
1pc
IP Camera Specification:
Model No.
VG100151HIPC
Image Sensor
1.3 Megapixel,1/3″ CMOS
Chipset
3518+0130
Min. Illumination
0.6Lux (color); 0.08Lux (B/W)
S/N Rate
>50dB (AGC OFF)
Electronic Shutter
1/50(60)—1/10000sec
Lens
M12 3.6mm / M12 6mm Lens
Day & Night
Color / Black & White / Auto; IR Cut Filter With Auto Switch
Video Compression
H.264
Bit Rate
Dual-stream; 0.1M-8M
Frame Rate
1-25 fps
Image Settings
Saturation, Brightness, Contrast Adjustable Through Client Software
Protocols
TCP / IP, HTTP, DNS, DDNS, RTP / RTSP, PPPoE, SMTP, NTP, SNMP, HTTPS
IR LED
36pcs IR LED
IR Distance
30m
General Function
Reset Software, Watchdog
Communication Interface
1 RJ45 Ethernet Interface
Operating Function
Support Web Configuration; Support OSD; Support Real-time Video Transmission; Support Front Storage, Playback & Download; Screen Pop-up Linkage; Support CMS Remote View (UC2)
Remote View
Computer
IE 6.0 Or Up, Max 5 User
Mobile Phone
Windows Mobile, Symbian, iPhone, Android
Color / Material
Black / Metal
Power
DC 12 V; 3W MAX
Operating Temperature
-10 °C ~ 50 °C
NVR Specification:
Operating System
LINUX
Compression
H.264
IP Camera Input
4CH 720P, 4CH 960P, 2CH 1080P
Live Display Resolution
1920*1080 1440*900 1366*768
1280*1024 1024*768 800*600
Recording Resolution
720P(1280*720), 960P(1280*960), 1080P(1920*1080)
HDMI
1CH
Video Output
1CH VGA Output
Playback
1CH 720P
Support
 P2P, ONVIF
HDD
1 SATA, Max 3TB
USB Interface
2 USB
Network Interface
RJ-45 port (10/100M/1000M)
Total  Frame  Rate
100 fps/sec
Power
DC15V 4A
Working Temperature
-10 ° C ~ +55 ° C
Working Humidity
10%~90%

hrfs tech cctv

* All you need is to give us a ring and we get you a BEST deal.
* This is something you can’t find elsewhere.

Interested:Click on Show Nowand you can purchase it directly from our website, orcontact usto arrange an appointment.

 

keyword:

South Auckland – Manurewa Otara, Panmure Mount Wellington Manukau CCTV installs in Auckland, Manukau CCTV install, Otahuhu, Ellerslie, Panmure, Penrose, Onehunga, North Shore, St Heliers, Mount Wellington


  • -

CCTV System Auckland – TradeMe Affordable CHEAP CCTV System – Good Quality Cameras CCTV System with Installation, Auckland Wide Cheap CCTV Installer in Auckland, Manukau, MIT cheap Laptop for only $200 Albany, Arch Hill, Auckland Central, Avondale, Balmoral, Belmont, Birkenhead, Browns Bay, Bucklands Beach, Clevedon, Devonport, Drury, Eden Terrace, Ellerslie, Epsom, Glen Eden, Glendene, Glen Innes, Glenfield, Grafton, Greenhithe, Greenlane, Grey Lynn, Henderson, Helensville, Herne Bay, Hibiscus Coast, Hillsborough, Howick, Kaiaua, Kaukapakapa, Kingsland, Kohimaramara, Mairangi Bay, Mangere, Mangere Bridge, Manukau, Manukau City, Manurewa, Massey, Meadowlands, Mercer, Mission Bay, Mt. Albert, Mt Eden, Mt Wellington, New Lynn, Newmarket, Newton, Northcote, Onehunga, Orakei, Otahuhu, Otara, Oweiraka, Pakuranga, Panmure, Papakura, Papatoetoe, Parnell, Point Chevalier, Ponsonby, Remuera, Royal Oak, Silverdale, St Heliers, St Lukes, Takanini CCTV Installer, Camera CCTV System, Camera System

hrfs tech cctv

Good Quality Cameras

Excellent Customer Care

Responsibility, and on-time support

Good affordable Price

For More Details, Click HERE 

Closed-circuit television (CCTV) systems transmit video signals on a closed network. CCTV has many applications. Typically in New Zealand CCTV is used in crime prevention/detection, monitoring process controls and traffic flows. There is an increasing trend toward using CCTV to deal with anti social behaviour, crowd control and in educational institutions. Smaller CCTV systems are also now cost efficient for residential use.

Description: cctv

Mobile Computer Laptop, Desktop Repairs, Office Computer Repairs and Remote Assistance Auckland Wide, Servicing. Computer repairs, Computer Hardware and Virus Removal, Mobile Auckland wide service · Virus & Malware Removal. We will clean up your systems for you\Computer, Laptop, Tablet and Phone (Apple IPAD, IPHONE, ASUS and SAMSUNG, … Computer Virus,  Virus Removal; Computer Blue Screen; Computer crashing

Keyword:

CCTV System Auckland – TradeMe Affordable CHEAP CCTV System – Good Quality Cameras CCTV System with Installation, Auckland Wide Cheap CCTV Installer in Auckland, Manukau, MIT cheap Laptop for only $200 Albany, Arch Hill, Auckland Central, Avondale, Balmoral, Belmont, Birkenhead, Browns Bay, Bucklands Beach, Clevedon, Devonport, Drury, Eden Terrace, Ellerslie, Epsom, Glen Eden, Glendene, Glen Innes, Glenfield, Grafton, Greenhithe, Greenlane, Grey Lynn, Henderson, Helensville, Herne Bay, Hibiscus Coast, Hillsborough, Howick, Kaiaua, Kaukapakapa, Kingsland, Kohimaramara, Mairangi Bay, Mangere, Mangere Bridge, Manukau, Manukau City, Manurewa, Massey, Meadowlands, Mercer, Mission Bay, Mt. Albert, Mt Eden, Mt Wellington, New Lynn, Newmarket, Newton, Northcote, Onehunga, Orakei, Otahuhu, Otara, Oweiraka, Pakuranga, Panmure, Papakura, Papatoetoe, Parnell, Point Chevalier, Ponsonby, Remuera, Royal Oak, Silverdale, St Heliers, St Lukes, Takanini CCTV Installer, Camera CCTV System, Camera System


  • -

Auckland CCTV Installer, GPS and Alarm CCTV System Manukau South Auckland, Henderson, West, New Lynn, Mount Roskill, CCTV System, Affordable Price

hrfstech cameras

Auckland CCTV Installer, GPS and Alarm CCTV System Manukau South Auckland, Henderson, West, New Lynn, Mount Roskill, CCTV System, Affordable Price

– 1 X 8CH HDMI 960H Onvif CCTV DVR NVR (Hard Drive 1TB is Included)
– 4 X 1200TVL Waterproof Outdooer IR-CUT Security Cameras
– 4 X 60ft(18.3M) Video + Power Cable for Security Cameras
– 1 X 1-4 Power Splitter Cable for Cameras
– 1 X USB Mouse For DVR
– 1 X Power Supply for DVR
– 1 X Power Supply for Cameras
– 1 X English User’s Manual
– 1 X CD Software

hrfstech 8 ch dvr 4 ch cameras

DVR Specifications:
Product Description 8CH 1080P HDMI Onvif DVR NVR
Operation System Embedded Linux
Video Compression H.264
Video Video System PAL/NTSC Switch Selectable
Video Input 8CH BNC Interface
Video Output 1CH BNC Interface
HD Output HDMI (1920*1080)
VGA Output (1920*1080,1440*900,1280*1­024,1280*720,1024*768 Selectable)
Audio Input 8* RCA Interface
Output 1* RCA Interface
Remote Access Cloud System For Remote Access, NO Port Mapping
Recording Mode Schedule, Manual, Motion Detection Alarm
Backup Flash Drive / USB HDD / Network
Hard Drive Interface 3.5 inch SATA II Interface (Up to 2T Hard Disk)
Frame Rate Main Stream 1~25 FPS
Video Playback CIF/DI/960H/720P/1080P Recording Playback?
Ethernet Interface 1*RJ-45 10M/100M
USB Interface 3*USB Interface
Network Service TCP/IP, UDP, HTTP, DDNS, SMTP, LAN, DHCP
Onvif Protocol Onvif 2.0
Working Temperature -10—55
Working Humidity 10–90
Camera Specifications:
Image Sensor Image Sensor Type CMOS
Sensor Size 1/4 Inch
Signal System PAL
Horizontal Resolution 1200 TV Lines
Lens 6mm
Minimum Illumination 0.1LUX/F1.2
Day/Night IR-CUT
Waterproof IP66
Camera Features IR Led 36 pcs
IR Irradiation Distance 10m~20m
S/N Ratio > 48dB
Video Output 1.0Vp-p/75O BNC
White Balance Automatic
Backlight Compensation Automatic
Physical Environment Power Supply 12V DC
Material Metal Shell
Application Outdoor/Indoor

Night Vision & Mobile Views

Keyword:

Cheap CCTV Installer in Auckland, Manukau, MIT cheap Laptop for only $200 Albany, Arch Hill, Auckland Central, Avondale, Balmoral, Belmont, Birkenhead, Browns Bay, Bucklands Beach, Clevedon, Devonport, Drury, Eden Terrace, Ellerslie, Epsom, Glen Eden, Glendene, Glen Innes, Glenfield, Grafton, Greenhithe, Greenlane, Grey Lynn, Henderson, Helensville, Herne Bay, Hibiscus Coast, Hillsborough, Howick, Kaiaua, Kaukapakapa, Kingsland, Kohimaramara, Mairangi Bay, Mangere, Mangere Bridge, Manukau, Manukau City, Manurewa, Massey, Meadowlands, Mercer, Mission Bay, Mt. Albert, Mt Eden, Mt Wellington, New Lynn, Newmarket, Newton, Northcote, Onehunga, Orakei, Otahuhu, Otara, Oweiraka, Pakuranga, Panmure, Papakura, Papatoetoe, Parnell, Point Chevalier, Ponsonby, Remuera, Royal Oak, Silverdale, St Heliers, St Lukes, Takanini CCTV Installer, Camera CCTV System, Camera System

Fix a Slow PC in Auckland, Manukau, Penrose, Otara, Otahuhu, Arch Hill, Auckland Central, Avondale, Balmoral, Belmont, Birkenhead, Browns Bay, Bucklands Beach, Clevedon, Devonport, Drury, Eden Terrace, Ellerslie, Epsom, Glen Eden, Glendene, Glen Innes, Glenfield, Grafton, Greenhithe, Greenlane, Grey Lynn, Henderson, Helensville, Herne Bay, Hibiscus Coast, Hillsborough, Howick, Kaiaua, Kaukapakapa, Kingsland, Kohimaramara, Mairangi Bay, Mangere, Mangere Bridge, Manukau, Manukau City, Manurewa, Massey, Meadowlands, Mercer, Mission Bay, Mt. Albert, Mt Eden, Mt Wellington, New Lynn, Newmarket, Newton, Northcote, Onehunga, Orakei, Otahuhu, Otara, Oweiraka, Pakuranga, Panmure, Papakura, Papatoetoe, Parnell, Point Chevalier, Ponsonby, Remuera, Royal Oak, Silverdale, St Heliers, St Lukes, Takanini
Mobile Computer Laptop, Desktop Repairs, Office Computer Repairs and Remote Assistance Auckland Wide, Servicing. Computer repairs, Computer Hardware and Virus Removal, Mobile Auckland wide service · Virus & Malware Removal. We will clean up your systems for you\Computer, Laptop, Tablet and Phone (Apple IPAD, IPHONE, ASUS and SAMSUNG, … Computer Virus, Virus Removal; Computer Blue Screen; Computer crashing

Auckland CCTV Installer, GPS and Alarm CCTV System Manukau South Auckland, Henderson, West, New Lynn, Mount Roskill, CCTV System, Affordable Price


  • -

Cheap CCTV Installer in Auckland, Manukau, MIT cheap Laptop for only $200 Albany, Arch Hill, Auckland Central, Avondale, Balmoral, Belmont, Birkenhead, Browns Bay, Bucklands Beach, Clevedon, Devonport, Drury, Eden Terrace, Ellerslie, Epsom, Glen Eden, Glendene, Glen Innes, Glenfield, Grafton, Greenhithe, Greenlane, Grey Lynn, Henderson, Helensville, Herne Bay, Hibiscus Coast, Hillsborough, Howick, Kaiaua, Kaukapakapa, Kingsland, Kohimaramara, Mairangi Bay, Mangere, Mangere Bridge, Manukau, Manukau City, Manurewa, Massey, Meadowlands, Mercer, Mission Bay, Mt. Albert, Mt Eden, Mt Wellington, New Lynn, Newmarket, Newton, Northcote, Onehunga, Orakei, Otahuhu, Otara, Oweiraka, Pakuranga, Panmure, Papakura, Papatoetoe, Parnell, Point Chevalier, Ponsonby, Remuera, Royal Oak, Silverdale, St Heliers, St Lukes, Takanini CCTV Installer, Camera CCTV System, Camera System

hrfstech 8 ch dvr 4 ch cameras

– 1 X 8CH HDMI 960H Onvif CCTV DVR NVR (Hard Drive not Included)
– 4 X 1200TVL Waterproof Outdooer IR-CUT Security Cameras
– 4 X 60ft(18.3M) Video + Power Cable for Security Cameras
– 1 X 1-4 Power Splitter Cable for Cameras
– 1 X USB Mouse For DVR
– 1 X Power Supply for DVR
– 1 X Power Supply for Cameras
– 1 X English User’s Manual
– 1 X CD Software

DVR Specifications:
Product Description 8CH 1080P HDMI Onvif DVR NVR
Operation System Embedded Linux
Video Compression H.264
Video Video System PAL/NTSC Switch Selectable
Video Input 8CH BNC Interface
Video Output 1CH BNC Interface
HD Output HDMI (1920*1080)
VGA Output (1920*1080,1440*900,1280*1­024,1280*720,1024*768 Selectable)
Audio Input 8* RCA Interface
Output 1* RCA Interface
Remote Access Cloud System For Remote Access, NO Port Mapping
Recording Mode Schedule, Manual, Motion Detection Alarm
Backup Flash Drive / USB HDD / Network
Hard Drive Interface 3.5 inch SATA II Interface (Up to 2T Hard Disk)
Frame Rate Main Stream 1~25 FPS
Video Playback CIF/DI/960H/720P/1080P Recording Playback?
Ethernet Interface 1*RJ-45 10M/100M
USB Interface 3*USB Interface
Network Service TCP/IP, UDP, HTTP, DDNS, SMTP, LAN, DHCP
Onvif Protocol Onvif 2.0
Working Temperature -10—55
Working Humidity 10–90
Camera Specifications:
Image Sensor Image Sensor Type CMOS
Sensor Size 1/4 Inch
Signal System PAL
Horizontal Resolution 1200 TV Lines
Lens 6mm
Minimum Illumination 0.1LUX/F1.2
Day/Night IR-CUT
Waterproof IP66
Camera Features IR Led 36 pcs
IR Irradiation Distance 10m~20m
S/N Ratio > 48dB
Video Output 1.0Vp-p/75O BNC
White Balance Automatic
Backlight Compensation Automatic
Physical Environment Power Supply 12V DC
Material Metal Shell
Application Outdoor/Indoor

Night Vision & Mobile Views

 

Keyword:

Cheap CCTV Installer in Auckland, Manukau, MIT cheap Laptop for only $200 Albany, Arch Hill, Auckland Central, Avondale, Balmoral, Belmont, Birkenhead, Browns Bay, Bucklands Beach, Clevedon, Devonport, Drury, Eden Terrace, Ellerslie, Epsom, Glen Eden, Glendene, Glen Innes, Glenfield, Grafton, Greenhithe, Greenlane, Grey Lynn, Henderson, Helensville, Herne Bay, Hibiscus Coast, Hillsborough, Howick, Kaiaua, Kaukapakapa, Kingsland, Kohimaramara, Mairangi Bay, Mangere, Mangere Bridge, Manukau, Manukau City, Manurewa, Massey, Meadowlands, Mercer, Mission Bay, Mt. Albert, Mt Eden, Mt Wellington, New Lynn, Newmarket, Newton, Northcote, Onehunga, Orakei, Otahuhu, Otara, Oweiraka, Pakuranga, Panmure, Papakura, Papatoetoe, Parnell, Point Chevalier, Ponsonby, Remuera, Royal Oak, Silverdale, St Heliers, St Lukes, Takanini CCTV Installer, Camera CCTV System, Camera System

Fix a Slow PC in Auckland, Manukau, Penrose, Otara, Otahuhu, Arch Hill, Auckland Central, Avondale, Balmoral, Belmont, Birkenhead, Browns Bay, Bucklands Beach, Clevedon, Devonport, Drury, Eden Terrace, Ellerslie, Epsom, Glen Eden, Glendene, Glen Innes, Glenfield, Grafton, Greenhithe, Greenlane, Grey Lynn, Henderson, Helensville, Herne Bay, Hibiscus Coast, Hillsborough, Howick, Kaiaua, Kaukapakapa, Kingsland, Kohimaramara, Mairangi Bay, Mangere, Mangere Bridge, Manukau, Manukau City, Manurewa, Massey, Meadowlands, Mercer, Mission Bay, Mt. Albert, Mt Eden, Mt Wellington, New Lynn, Newmarket, Newton, Northcote, Onehunga, Orakei, Otahuhu, Otara, Oweiraka, Pakuranga, Panmure, Papakura, Papatoetoe, Parnell, Point Chevalier, Ponsonby, Remuera, Royal Oak, Silverdale, St Heliers, St Lukes, Takanini
Mobile Computer Laptop, Desktop Repairs, Office Computer Repairs and Remote Assistance Auckland Wide, Servicing. Computer repairs, Computer Hardware and Virus Removal, Mobile Auckland wide service · Virus & Malware Removal. We will clean up your systems for you\Computer, Laptop, Tablet and Phone (Apple IPAD, IPHONE, ASUS and SAMSUNG, … Computer Virus, Virus Removal; Computer Blue Screen; Computer crashing


  • -

How to Transfer Contacts from Andriod Phone to PC – Cheap Computer Repair South Auckland, Manukau, Auckland

How to Transfer Contacts between Android and Computer
Did you just buy the latest version of Android smartphone? The first thing that you’ll probably do is to get all the phone numbers and other contact information on your new Android phone, such as Samsung Galaxy S6/S5, LG G4/G3, etc. It is exciting to say goodbye to an outdated handset and enjoy using a new one. Yet, to get previous stored contacts back to cell phone or even transfer them to a computer for backup is like an unsolvable math which confuse most of the phone users.

This tutorial will show you how to transfer contacts from Android to PC with the help of Android Transfer. You may be able to copy complete information of contacts including names, numbers and call history. Click below icons to download the software.

Download Win Download Mac

Tutorial for Transferring Contacts from Android to PC (Example of Samgung Galaxy S6)

Step 1 Connect Device to Computer
To get started, please download and launch Android Transfer on your PC. Then, follow the onscreen instructions to connect your Android phone to PC via a USB cable or QR code.

connet android transfer to pc

Step 2 Export Contact List
Once click “Contacts” on the right panel you’ll see a list of your call records. On the top of the screen, click the icon that says “Export“. You’ll may choose vCard files to save your contacts after deciding which information to import/export. Android Transfer provides you with multiple options to move your address book – Outlook Express, Outlook 2003-2013, Windows Live Mail and Windows Address book.

transfer contacts

With all these options available for transferring your information, what are you waiting for? You can merge duplicate phone numbers and add a new one on the big computer screen. Download Android Transfer to manage your data and do leave us messages on comment so we can know a better way to improve our services. Thank you and have fun!


  • -

Affordable Tech Deal in Auckland Wide, Cheap CCTV Install – OI -How to Automatically Create Build Backups in Visual Studio HRFSTech Computer Repair Website Design Cheap Service with Free Callouts

How to Automatically Create Build Backups in Visual Studio

 How to Automatically Create Build Backups in Visual Studio

hrfstech

If you are a one man development team, you probably don’t really have the need for a full blown version control system, yet creating source code backups for each released version is undoubtedly important.

By leveraging the power of post-build events and a simple batch script, you can easily add the ability to have Visual Studio automatically create a source code backup for each release code build.
How it works
Our solution is simple: whenever a successful build event occurs, we have a batch script run which creates a compressed archive (optionally tagged and timestamped) of all files in the respective Visual Studio project folder.

That’s it. All you have to do is follow the steps below.

Setting up automatic build backups
First you will need to download and extract the batch script file from the link at the bottom of the article. Additionally, you will need the 7-Zip command line tool (this is included with a the ‘full’ version of the Project Build Backup script, or you can download it separately). In our example, we extracted these files to the directory “C:\Tools”, but any location will work.

Open your Visual Studio Project properties, by double-clicking on My Project under the respective project.

image

In the project properties, go to the Compile section.

image

In the bottom right corner, click the Build Events button.

image

In our case, we want to make a backup after a successful compile action. Make sure you have the option to run the post-build event “On successful build” and then click the Edit Post-build button.

image

The command below creates a build backup only for the compile of the Release configuration (this is what IF condition checks for) as, realistically, we probably don’t want to make a backup of each Debug/testing build. Additionally, the current timestamp will be appended (/D switch) with the backup file being in 7z file format (/7z) as opposed to zip. By adding the /T “$(ConfigurationName)” as a parameter, we are appending the build type (Release in this case) to the name of the backup file.

IF “$(ConfigurationName)” == “Release” CALL C:\Tools\ProjectBuildBackup.bat “$(SolutionDir)” “$(ProjectDir)” “$(ProjectName)” /T “$(ConfigurationName)” /D /7z

Using the Macros button, you can have Visual Studio prefill project specific information so no hardcoding is required. You can adjust this command as needed (especially the location of the batch file), but the first three parameters will likely not need to be changed.

It is important to keep in mind that post-event operations run regardless of the project configuration selected. This is why we need to add the IF “$(ConfigurationName)” == “Release” statement – otherwise the backup action would occur on every successful build event.

image

Once you finish your command and apply it, the command string should appear in the Post-build events section.

Note that while the “CALL” command is not technically required, it is highly recommended, as if this is omitted then any events added after this may not execute.

image

Now whenever you run a compile/build with your project in the Release configuration, you will see the output from the build backup operation.

image

[…]image

Each successful Release build creates a new timestamped archive with the solution folder in a subdirectory, “Builds” (which can be custom defined with the /O switch if needed).

image

The contents of each backup is the full Visual Studio project – source files, configuration settings, compiled binaries, and all – which makes this a true point in time backup.

image

Not a replacement for a full version control system
In closing, we just want to reiterate that this tool is not intended to replace a full blown version control system. It is simply a useful tool for developers to create snapshots of their project’s source code after each compilation.

In the event you ever have to go back and examine a prior version, having a ready-to-use (just extract to a new directory) project file for a point in time compilation can really come in handy.

Links
Download Project Build Backup Script

Download 7-Zip Command Line Tool (Note – the 7za utility is also bundled with a download from the Project Build Backup script)

16 total views, no views today

Share this on


All 2014 Knowledge System

Search for an Operating Instructions if you can’t find it here. 

How to Kill a Desktop Application or Background Process on Linux

Windows has Ctrl+Alt+Delete and Macs have Command+Option+Escape to force frozen applications to close. Linux has its own ways of “killing” those misbehaving processes, whether they’re graphical windows or background processes.

The exact graphical tools you can use will depend on your desktop environment, as eachdesktop environment brings different tools to the table. But most of them are pretty similar.

From a Graphical Desktop

Modern Linux desktops deal with this fairly well, and it can be surprisingly automatic. If an application isn’t responding, a desktop with a compositiong manager will often gray the entire window out to show it isn’t responding.

Read More

How to Test Your Internet Speed from the Command Line

How to Enable Automatic Security Updates on Ubuntu Server

There’s nothing more tedious as a system administrator than running security updates on a dozen servers every single day. Luckily Ubuntu will let you automate stable security updates so you’re never at risk.

All you need to do is run this one single command on your server:

sudo dpkg-reconfigure -plow unattended-upgrades

If you are logged in as root you can skip the sudo, of course.

Read More

Office file types fail to Open From Server

When you try to open or download a Microsoft Office file that is stored on a web server or a third-party web server, the associated Office application starts, but the selected file is not opened or downloaded. For example, the Office file is stored on a SharePoint server or a Web Distributed Authoring and Versioning (WebDAV) server. You get following error message:

When this problem occurs, try using HTTPS instead of HTTP to access the Office files. For example, use https://www.site.cominstead of http://www.site.com.  If you still can’t open the Office files, contact the site server administrator.

Cause

This problem occurs when the following conditions are true:

  • The server is configured for Basic authentication.

Read More

Some Useful Day-To-Day Software

Microsoft Office 2010, 2013: Download Link – Call us for “activation” – Direct Link

YouTube Downloader:  YTD Video Downloader   – Important: For installation, follow this steps Otherwise your computer might get effected by virus.

VLC Player: Download link – Direct Link

Click Here For More

Installing windows flash cards (Q&A) hrfs tech

The price for Windows 7 is the same regardless of the edition and type of license you purchaseAnswer: False

The OEM version of Windows 7 can only be installed on a new PC for resale.

Answer: True

When a partition is formatted with a file system and assigned a drive letter it is called a volume.Answer: True

Read More

Office 365 Unified Messaging with Lync 2013 On Premise

Lync 2013 Enterprise Voice On Premise – Exchange 2010 Sp3 Hybrid with The New Office 365 tenant (Wave 15)

First of all open up a PS shell on your Lync FE on premise then run:

  1. Set-csaccessedgeconfiguration –allowfederatedusers $true
  2. New-CsHostingProvider -Identity “Exchange Online” -Enabled $True -EnabledSharedAddressSpace $True -HostsOCSUsers $False -ProxyFqdn “exap.um.outlook.com” -IsLocal $False -VerificationLevel UseSourceVerification

Read More

How to “built” Active Directory in Windows Server 2012

As we all know, AD DS database stores information on user identity, computers,groups,services andresources.

AD DS domain controllers also host the service that authenticates user and computer accountswhen they log on to the domain. Because AD DS stores information about all of the objects in the domain, and all users and computers must connect to AD DS domain controllers when signing into the network, AD DS is the primary means by which you can configure and manage user and computer accounts on your network.

So today, I will guide you on how to “built” @ deploy.. and my students always name this process as a “Installation of Active Directory in Windows Server 2012“.

For this Simple Guide, I’m using Core I5-3470 3.20Ghz proc & 3.8GB RAM, all the process using Hyper-V & private network.

Let’s get started..

1 – Double confirm the Windows Server 2012 that you are using still in Workgroup configuration.

Read More

How to Rename Domain Name in Windows Server 2012 (Cluster Hyper-V and/or in-house exchange-DC?

For this exercises, I’m using MCT courseware from 20410B (Installing and Configuring Windows Server 2012).

The existing domain is ADATUM.COM and I will rename it to CPX.LOCAL.

** for those who want to built your own AD and try this exercises, please refer to my previous post 

So, let get started…

1 – Open your System Properties and check your existing domain name, if you see from my Windows Server 2012 system properties, my existing domain name isAdatum.com. This will be change to cpx.local in the short while.

Read More

Installing .NET Framework 3.5 in Windows 8 and in Windows Server 2012

Windows 8 or use this for Windows Server 2012 R2 if virtually under a Windows 8 or 8.1 Pro etc.

In Windows 8 open the Programs and Features dialog. For me the easiest way to access this dialog is via the Windows+X admin menu:

Or if windows is added to the domain or no internet access then run installation thru command line:

dism /online /enable-feature /featurename:NetFx3 /All /Source:D:\sources\sxs /LimitAccess

Read More

How to Install Windows 8.1 without a Product Key

  • Step 1: Once you’ve created a Bootable windows 8.1 USB Flash drive.  Create a Text document and copy  the following text in it.

[EditionID]
Core
[Channel]
Retail
[VL]
0

Read More

How to Build a Bootable USB Drive? or How to Install an Operating System from a USB Device?

1.  Get a USB Drive of sufficient size to contain the OS installation files you desire to install.  (If you were going to install Windows 7 this drive woul dneed to be at least 4 GB in size)

Short Version:

  1. Insert a USB flash drive into a running computer.
  2. Open a Command Prompt window as an administrator.
  3. Type diskpart.
  4. In the new command line window that opens, to determine the USB flash drive number or drive letter, at the command prompt, type list disk, and then click ENTER. The list disk command displays all the disks on the computer. Note the drive number or drive letter of the USB flash drive.

Read More

Fine Tune Star Receiver

STAR Rx can accept wide range of input signal power i.e. –20 to –60 dBm. However, the STAR Rx must be configured its “stargain” according to the signal power. Stargain controls the amplifier for the input signal. The STAR input signal can be high or low depending on the configuration of the BDC, dividers and other things.

Read More

Instructions on how to setup your email account for Microsoft Outlook. 

Click on below links to Download Instructions.

Help Outlook

HelpThunderbird 

HelpWindowsMail

How to adjust the DVB power levels in ViaSat System

ViaSat power level change was done at 8:18 PM by 1 dB and then at 8:32 PM by another 1 dB and changed back at 8:45 PM. I couldn’t see much differences once 1 dB changes was done, but at 2 dB ViaSat changes ACM gain increased 35%. For more details

Click Here

How to Change Time Zone in iDirect due to Daylight Saving

Setting the Date and Time on the NMS Servers TZ select  – For More details

17 total views, no views today

Share this on


How to Enable Pin Sign-in For Domain Users on Windows 8

How to Enable Pin Sign-in For Domain Users on Windows 8

Domain users are not allowed to sign in with a Pin by default. However, using a little bit of GPO, we can change that.

How to Enable Pin Sign On For Domain Users on Windows 8

Press the Win + R keyboard combination to open a run box then type “gpedit.msc” and press enter.

image

When the Group Policy editor opens, navigate to:

Computer Configuration\Administrative Templates\System\Logon

image

On the right hand side, double click on the “Turn on PIN sign-in” setting.

image

Now switch the radio button from Not Configured to Enabled, then click Apply.

image

Once the setting has been activated, you need to refresh your current Group Policy settings. To do that, open a run box using the Win + R keyboard combo and type the following, then press enter.

gpupdate /force

image

Of course, this will only be useful in a domain environment, in which case you could assign this group policy setting to an OU in Active Directory. That’s all there is to it.

26 total views, no views today

Share this on


How to Kill a Desktop Application or Background Process on Linux

How to Kill a Desktop Application or Background Process on Linux

Windows has Ctrl+Alt+Delete and Macs have Command+Option+Escape to force frozen applications to close. Linux has its own ways of “killing” those misbehaving processes, whether they’re graphical windows or background processes.

The exact graphical tools you can use will depend on your desktop environment, as each desktop environment brings different tools to the table. But most of them are pretty similar.

From a Graphical Desktop

Modern Linux desktops deal with this fairly well, and it can be surprisingly automatic. If an application isn’t responding, a desktop with a composition manager will often gray the entire window out to show it isn’t responding.

Click the X button on the window’s titlebar and the window manager will often inform you that the window isn’t responding. You can either give it some time to respond or click an option like “Force Quit” to foricbly close the application.

On Linux, the window manager that paints the title bars is separate from the application itself, so it usually responds even if the window won’t. Some windows do paint their own interfaces, though, so this may not always work.

The “xkill” application can help you quickly kill any graphical window on your desktop.

Depending on your desktop environment and its configuration, you may be able to activate this shortcut by pressing Ctrl+Alt+Esc. You could also just run the xkill command — you could open a Terminal window, type xkill without the quotes, and press Enter. Or, you could press a shortcut like Alt+F2, which opens the “Run Command” dialog on Ubuntu’s Unity desktop and many others. Type xkill into the dialog and press Enter.

Your cursor will change to an X. Click a window and the xkill utility will determine what process is associated with that window, and then immediately kill that process. The window will instantly vanish and close.

Your Linux desktop probably has a tool that works similarly to the Task Manager on Windows, too. On Ubuntu’s Unity desktop, GNOME, and other GNOME-based desktops, this is the System Monitor utility. Open the System Monitor utility to see a list of running proesses — including background ones. You can also forcibly kill processes from here if they’re misbehaving.

From the Terminal

Let’s say you want to do this all from the terminal instead. We covered a lot of the utilities you can use for this when we looked at commands for managing processes on Linux.

Let’s say Firefox is running in the background and we want to kill it from the terminal. The standard kill command takes a process ID number, so you’ll need to find it first.

For example, you could run a command like:

ps aux | grep firefox

Which would list all processes and pipe that list to the grep command, which will filter it and print only lines containing Firefox. (The second line you’ll see is the grep process itself.) You can also get the process ID from the top command and many other places.

Take the process ID number from the Firefox process — just to the right of the username — and provide it to the kill command. That is, run the command like so:

kill ####

If the process is running as another user, you’ll need to become the root user first — or at least run the kill command with the sudo command, like so:

sudo kill ####

That’s a basic method, but it isn’t quite the fastest. The pgrep and pkill commands help streamline this. For example, run “pgrep firefox” to see the process ID of the running Firefox process. You could then feed that number to the kill command.

Or, skip all that and run “pkill firefox” to kill the Firefox process without knowing its number. pkill performs some basic pattern-matching — it’ll try to find processes with names containing firefox.

The killall command is like pkill, but a bit more precise. It’ll kill all running processes with a specific name. So running “killall firefox” will kill all running processes named “firefox,” but not any processes that just have firefox in their names.


These are far from the only commands included on Linux for managing processes. If you’re using some type of server administration software, it may also have helpful ways to kill and restart processes.

System services work different from processes — you’ll need to use specific commands to bring down, restart, or bring up services. Those specific commands can be different on different Linux distributions.

25 total views, no views today

Share this on


How to Enable Automatic Security Updates on Ubuntu Server

How to Enable Automatic Security Updates on Ubuntu Server

There’s nothing more tedious as a system administrator than running security updates on a dozen servers every single day. Luckily Ubuntu will let you automate stable security updates so you’re never at risk.

All you need to do is run this one single command on your server:

sudo dpkg-reconfigure -plow unattended-upgrades

If you are logged in as root you can skip the sudo, of course.

Once you run the command you’ll be presented with a very pink screen that might prompt you to say Ok.

If your terminal was a little wider you probably would see it all on a single page, but either way you’ll be asked if you want to automatically download and install stable updates. Select Yes.

The utility will write out the necessary configuration files, and security updates should become automated. Note that by default it’s going to wait to check once a day, so it’s not like any pending security updates will be instantly installed once you change this setting, but you shouldn’t have to install security updates ever again.

32 total views, 1 views today

Share this on


Office file types fail to Open From Server

Office file types fail to Open From Server

When you try to open or download a Microsoft Office file that is stored on a web server or a third-party web server, the associated Office application starts, but the selected file is not opened or downloaded. For example, the Office file is stored on a SharePoint server or a Web Distributed Authoring and Versioning (WebDAV) server. You get following error message:

When this problem occurs, try using HTTPS instead of HTTP to access the Office files. For example, use https://www.site.cominstead of http://www.site.com.  If you still can’t open the Office files, contact the site server administrator.

Cause

This problem occurs when the following conditions are true:

  • The server is configured for Basic authentication.
  • The connection between your computer and the web server does not use Secure Sockets Layer (SSL).

By default, file operations that use Basic authentication over a non-SSL HTTP connection are disabled in Office 2010 and Office 2013 applications.

When Basic authentication is disabled, one of the following events occurs:

  • The client application uses a different authentication method. This occurs if the server supports a different authentication method.
  • The request fails (for details about what happens when a request fails, see the list in the “Additional symptom details” section).

Resolution

If the workaround of using HTTPS instead of HTTP does not work, the resolution is to enable SSL encryption on the web server to allow for client access over HTTPS.Note By default, Office 2010 applications can access and download files from a web server that uses Basic authentication only over an SSL connection.

Workaround

To work around this problem, let Office 2013 and Office 2010 applications connect to a web server by using Basic authentication over a non-SSL connection.Warning When you enable Basic authentication without SSL, you are subject to a significant security risk.

About Basic authentication and its security risk

Basic authentication requires users to a valid user name and password to access content. This authentication method does not require a specific browser, and all major browsers support it. Basic authentication also works across firewalls and proxy servers. For these reasons, it is a good choice when you want to restrict access to some, but not all, content on a server.However, the disadvantage of Basic authentication is that it transmits unencrypted base64-encoded passwords over the network. If the password is intercepted over the network by a network sniffer, an unauthorized user can determine the user name and password, and can then reuse these credentials. It is because of this security risk that Office 2010 applications disable Basic authentication over a non-SSL connection in the default configuration.You should use Basic authentication only when you know that the connection between the client and the server is secure. The connection should be established either over a dedicated line or by using SSL encryption and Transport Layer Security (TLS). For example, to use Basic authentication with WebDAV, you should configure SSL encryption.

For more information about Basic authentication, see Basic authentication and Configure Basic authentication (IIS 7).

For more information about SSL and certificates, see SSL and certificates.

Enable Basic authentication over a non-SSL connection

The following two steps describe how to enable Office 2013 and Office 2010 applications to open Office file types directly from a server that supports only Basic authentication over a non-SSL connection. You should follow these steps only if you are confident that the connection between the user and the web server is secure. A direct cable connection or a dedicated line would be considered optimal for secure connections.

Note For Office 2013 and Office 2010 applications, both steps are required. For other Office applications, only step 1 is required.

Step 1: Configure WebDAV Redirector on the client

Note This step is required for applications in the 2007 Office suite and in Office 2013 and Office 2010.

On the client computer, configure the WebDAV Redirector to enable Basic authentication over non-SSL connections.

Important Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, back up the registry for restoration in case problems occur.

Windows XP and Windows Server 2003

To enable Basic authentication on the client computer, follow these steps:

  1. Click Start, click Run, type regedit, and then click OK.
  2. Locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WebClient\Parameters
  3. On the Edit menu, point to New, and then click DWORD Value.
  4. Type UseBasicAuth, and then press Enter.
  5. Right-click UseBasicAuth, and then click Modify.
  6. In the Value data box, type 1, and then click OK.Note Basic authentication is enabled if the UseBasicAuth registry entry is set to a nonzero value. Basic authentication is disabled if the UseBasicAuth registry entry is not present, or if the UseBasicAuth registry entry is set to 0 (zero).The mapping is as follows:
    0 – Basic authentication disabled
    1 – Basic authentication enabled for SSL connections only
    2 – Basic authentication enabled for SSL and non-SSL connections
  7. Exit Registry Editor, and then restart the computer.

Windows Vista, Windows 7, and Windows 8 (Inc 8.1 & Pro)

To enable Basic authentication on the client computer, follow these steps:

  1. In Windows Vista or Windows 7, click Start, type regedit in the Start Search box, and then press Enter.In Windows 8, hold the Windows key (WINKEY) + F, highlight Apps in theMenu bar, type regedit in the Search box, and then press Enter.
  2. Locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WebClient\Parameters
  3. On the Edit menu, point to New, and then click DWORD Value.
  4. Type BasicAuthLevel, and then press Enter.
  5. Right-click BasicAuthLevel, and then click Modify.
  6. In the Value data box, type 2, and then click OK.Note The mapping is as follows:
    0 – Basic authentication disabled
    1 – Basic authentication enabled for SSL connections only
    2 – Basic authentication enabled for SSL and non-SSL connections
  7. Exit Registry Editor, and then restart the computer.

For more information about how to configure the WebDAV redirector to enable Basic authentication, click the following article number to view the article in the Microsoft Knowledge Base:

841215 Error message when you try to connect to a Windows SharePoint document library: “System error 5 has occurred”
Step 2: Update the Registry on the client

Note This step is required for Office 2013 and Office 2010 applications.

On the client computer, add the BasicAuthLevel registry key and an appropriate value. To do this, follow these steps.

Important Follow the steps in this section carefully. Serious problems might occur if you modify the registry incorrectly. Before you modify it, back up the registry for restoration in case problems occur.

  1. Start Registry Editor.
    • In Windows 8, hold the Windows key (WINKEY) + F, highlight Apps in the Menu bar, type regedit in the Searchbox, and then press Enter. If you are prompted for an administrator password or for confirmation, type the password, or provide confirmation.
    • In Windows 7 or in Windows Vista, click Start, type regedit in the Start Search box, then press Enter. If you are prompted for an administrator password or for confirmation, type the password, or provide confirmation.
    • In Windows XP, click Start, click Run, type regedit, and then click OK.
  2. Locate and then click one of the following registry subkeys:For Office 2010
    HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\Internet

    For Office 2013

    HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\Internet
  3. On the Edit menu, point to New, and then click DWORD Value.
  4. Type BasicAuthLevel, and then press Enter.
  5. Right-click BasicAuthLevel, and then click Modify.
  6. In the Value data box, type 2, and then click OK.Note The mapping is as follows:
    0 – Basic authentication disabled
    1 – Basic authentication enabled for SSL connections only
    2 – Basic authentication enabled for SSL and for non-SSL connections
  7. Exit Registry Editor, and then restart the computer.

24 total views, no views today

Share this on


YouTube Downloader Installation Steps

Step 1: In the bottom left corner of the screen you’ll see the download bar. Click on theYTDSetup.exe item.
Step 2: Press Yes in order to start the YTD Video Downloader product install.
Step 3: Follow the steps listed in the installer to successfully install the application.

Installation instructions for Google Chrome

Important: Make sure you click cancel on below two steps

hrfs tech ytd downloder

For any support, please fill in below forms with your details or call us.

Your Name (required)
Your Email (required)
Your Phone (required)

Subject (required)

Your Message (required)

Sending ...

36 total views, 1 views today

Share this on


Some Useful Day-To-Day Software

For any other software, please fill in below forms with your details.

You name it, we’ve got it!

Your Name (required)
Your Email (required)
Your Phone (required)

Subject (required)

Your Message (required)

Sending ...

22 total views, no views today

Share this on


Installing windows flash cards (Q&A)

 

Basic Q&A:

The price for Windows 7 is the same regardless of the edition and type of license you purchase

Answer: False

The OEM version of Windows 7 can only be installed on a new PC for resale.

Answer: True

 

When a partition is formatted with a file system and assigned a drive letter it is called a volume.

Answer: True

 

An upgrade from Windows Vista to Windows 7 carries applications and user settings forward into the new installation.

Answer: True

 

Which Windows 7 Edition is intended for business users and allows you to purchase multiple site licenses?

Answer: Windows 7 Professional

 

Which type of OS should you install for best performance when you have enough RAM?

Answer: 64 bit

 

What is it called when software is used to simulate the hardware of a physical computer?

Answer: Virtual Machine

 

A____boot allows you to install the new OS without disturbing the old one so you can boot to either OS.

Answer: Dual

 

What type of installation should you perform if you want to install a 64-bit version of Windows on a computer that already has a 32-bit OS installed?

Answer: Clean Install

 

What is the name of the directory database that controls access to a Windows Server domain?

Answer:Active Directory

 

Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? Answer: BIOS setup

 

Which network location option means that Network Discovery is turned off and you cannot join a homegroup or domain?

Answer: Public Network

 

For some brand-name computers, the hard drive contains a ______partition that can be used to reinstall Windows.

Answer: Hidden Recovery

 

The__________is used to change motherboard settings, finds a boot device, and contains instructions for running essential hardware before an OS is started. 

Answer: BIOS

 

In a Windows_____,each computer maintains a list of users and their rights on that particular computer.

Answer: Workgroup

 

A Windows domain is a type of _____network, which is a network where resources are managed by a centralized computer. Answer: Client/server

 

Which of the following is used to uniquely identify a computer on a network?

Answer: IP Address

 

What important information is needed if you are installing an OEM version of Windows 7?

Answer: Product Key

 

After installation, how many days do you have to activate Windows 7?

Answer: 30

 

Contains instructions for running essential hardware devices before an operating system is started _________

Answer: System BIOS

 

A network that is managed by each computer without centralized control ____________.

Answer:  Peer-to-peer network

 

A copy of an entire hard drive that includes Windows 7, drivers, and applications that are standard to all thA12:A45e computers that might use that copy.

Answer: Standard image

24 total views, no views today

Share this on


Office 365 Unified Messaging with Lync 2013 On Premise

Office 365 Unified Messaging with Lync 2013 On Premise

Lync 2013 Enterprise Voice On Premise – Exchange 2010 Sp3 Hybrid with The New Office 365 tenant (Wave 15)

First of all open up a PS shell on your Lync FE on premise then run:

  1. Set-csaccessedgeconfiguration –allowfederatedusers $true
  2. New-CsHostingProvider -Identity “Exchange Online” -Enabled $True -EnabledSharedAddressSpace $True -HostsOCSUsers $False -ProxyFqdn “exap.um.outlook.com” -IsLocal $False -VerificationLevel UseSourceVerification
  3. Get-csmanagementstorereplicationstatus ( to ensure replication has occured between all Lync servers make sure they all say true before moving on)
  4. Get-cshostingprovider -localstore to show the following
  5. Cshostingprovider
  6. Set-CsAccessEdgeConfiguration -UseDnsSrvRouting -AllowFederatedUsers 1 -EnablePartnerDiscovery 0
  7. New-CsHostedVoicemailPolicy -identity CloudUM -Destination exap.um.outlook.com -Description “Office 365 Voicemail” -Organization “tenantname.onmicrosoft.com” (Ensure you use the tenant name and NOT your on premise domain otherwise the traffic will not route and this will not work)

Log onto the O365 Wave 15 tenant

Go to Unified Messaging > UM Dial Plans > New

new um dial

Then Edit the Dial Plan > Configure

For this you should try and match the company’s on premise configuration so that it matches but below is an example:

configure

dial codes

outlook voice access

settings

dialling rules

dialling auth

transfer

Then on premise Lync 2013 you need to create the Exchange UM Contact for O365 within Lync Powershell

  • new-csexumcontact -displaynumber +44203XXXXX –sipaddress SIP:EX_UM_365_SA@yourdomain.com -registrarpool  yourpool01.youcompany.com -ou “OU=User,DC=yourcompany,dc=com”
  • Grant-cshostedvoicemailpolicy –identity “post the GUID that has been created” –policyname CloudUM

Then switch to Exchange Online Powershell

  • Set-UMmailboxpolicy -identity “Policy Name in O365” -SourceForestPolicy “CloudUM”
  • Set-UMmailboxpolicy -identity “Policy Name in O365” -SourceForestPolicy “On Premise UM Policy”

Then finally on your on premise Exchange 2010 SP3 server (Note this is only if Unified Messaging is already configured on premise so that when you migrate a UM mailbox it doesn’t fail otherwise if you don’t run this step the remote move request will fail)

  • Set-UMmailboxpolicy -identity “On Premise UM Policy” -SourceForestPolicy “Policy Name in O365”

The Very last step is to configure the user. Now if you are setting up UM brand new then carry out the following steps but if you are migrating a user then only carry this out after the user has migrated to Office 365 or you have suspended the move before completion. As otherwise UM will route to the cloud and until the mailboxes exists the voicemail message will never be delivered to the end user as you cannot have a spilt UM in cloud and mailbox on premise and vice versa.

Within Lync 2013 PowerShell

  • Grant-cshostedvoicemailpolicy –identity “accountname” –policyname CloudUM
  • Run get cs-user –identity “accountname” and check that hostedvoicemail is set to true if not run the following command.
  • Set-csuser –identity “youraccount” –hostedvoicemail $true

Finally force dirsync and then if the account in 365 doesn’t show unified messaging enable set then set it within the Exchange console in 365.

Keyword:

Affordable Cheap Computer Repair – Cheap CCTV Install – Cheap Website Design – Cheap CCTV Package – Cheap Laptop Repair – Cheap Virus Removal – Cheap GPS Installs in Auckland, Penrose, South Auckland, Penrose, Greenlane, Albany, Manurewa Otara, Panmure Mount Wellington Manukau CCTV installs in Auckland, Manukau CCTV install, Otahuhu, Ellerslie, Panmure, Penrose, Onehunga, North Shore, St Heliers, Mount Wellington, Manukau Computer Repairs Auckland Central – Parnell – New Market – Remuera – Epsom – Mission Bay – St Heliers


  • -

Cheap Computer Repair – Cheap CCTV Install – Cheap Website Design – Cheap CCTV Package – Cheap Laptop Repair – Cheap Virus Removal – Cheap GPS Installs in Auckland, Penrose, South Auckland, Penrose, Greenlane, Albany, Manurewa Otara, Panmure Mount Wellington Manukau CCTV installs in Auckland, Manukau CCTV install, Otahuhu, Ellerslie, Panmure, Penrose, Onehunga, North Shore, St Heliers, Mount Wellington, Manukau Computer Repairs Auckland Central – Parnell – New Market – Remuera – Epsom – Mission Bay – St Heliers

Price, don’t worry about it. We take care of your work, and only charge you a reasonable price that MAKES SENSE not what a normal computer shop charge you. Yes, we come to you. No call-out fee! Our customers are always surprised with our charges.

hrfstech cameras

Manukau Computer Repairs Auckland Central – Parnell – New Market – Remuera – Epsom – Mission Bay – St Heliers

All you need to fill in below form, and we will get back to you ASAP. Have a great day. 

[contact-form-7 id=”1318″ title=”Contact form 1″]

hrfstech computer repair in auckland pc repair, virus removal

Keyword:

Cheap Computer Repair – Cheap CCTV Install – Cheap Website Design – Cheap CCTV Package – Cheap Laptop Repair – Cheap Virus Removal – Cheap GPS Installs in Auckland, Penrose, South Auckland, Penrose, Greenlane, Albany, Manurewa Otara, Panmure Mount Wellington Manukau CCTV installs in Auckland, Manukau CCTV install, Otahuhu, Ellerslie, Panmure, Penrose, Onehunga, North Shore, St Heliers, Mount Wellington, Manukau Computer Repairs Auckland Central – Parnell – New Market – Remuera – Epsom – Mission Bay – St Heliers


  • -

Cheap CCTV Install in South Auckland – Good Quality Cameras Cheapest in the Market – Auckland Security Cameras South Auckland – Manurewa Otara, Panmure Mount Wellington Manukau CCTV installs in Auckland, Manukau CCTV install, Otahuhu, Ellerslie, Panmure, Penrose, Onehunga, North Shore, St Heliers, Mount Wellington

hrfstech 8 ch dvr 4 ch cameras hrfstech cameras – 1 X 8CH HDMI 960H Onvif CCTV DVR NVR (Hard Drive not Included) – 4 X 1200TVL Waterproof Outdooer IR-CUT Security Cameras – 4 X 60ft(18.3M) Video + Power Cable for Security Cameras – 1 X 1-4 Power Splitter Cable for Cameras – 1 X USB Mouse For DVR – 1 X Power Supply for DVR – 1 X Power Supply for Cameras – 1 X English User’s Manual – 1 X CD Software Specification DVR Specifications:

Product Description 8CH 1080P HDMI Onvif DVR NVR
Operation System Embedded Linux
Video Compression H.264
Video Video System PAL/NTSC Switch Selectable
Video Input 8CH BNC Interface
Video Output 1CH BNC Interface
HD Output HDMI (1920*1080)
VGA Output (1920*1080,1440*900,1280*1024,1280*720,1024*768 Selectable)
Audio Input 8* RCA Interface
Output 1* RCA Interface
Remote Access Cloud System For Remote Access, NO Port Mapping
Recording Mode Schedule, Manual, Motion Detection Alarm
Backup Flash Drive / USB HDD / Network
Hard Drive Interface 3.5 inch SATA II Interface (Up to 2T Hard Disk)
Frame Rate Main Stream 1~25 FPS
Video Playback CIF/DI/960H/720P/1080P Recording Playback?
Mulitiplex Operation Live Display/Record/Playback/Backup/Network Transmit
Ethernet Interface 1*RJ-45 10M/100M
USB Interface 3*USB Interface
Web Browser Supports IE Browser/CMS Software Monitoring
Network Service TCP/IP, UDP, HTTP, DDNS, SMTP, LAN, DHCP
Onvif Protocol Onvif 2.0
Mobile phone IPhone, IPad, Android Remote View
System requirement Windows XP/Vista/Windows 7/Windows 8
Power Supply 100V~240V 47Hz 63Hz
Working Temperature -10—55
Working Humidity 10–90
Accessories Included User Manual/ CD Disk/ Mouse / Power Supply

Camera Specifications:

Image Sensor Image Sensor Type CMOS
Sensor Size 1/4 Inch
Signal System PAL
Horizontal Resolution 1200 TV Lines
Lens 6mm
Minimum Illumination 0.1LUX/F1.2
Day/Night IR-CUT
Waterproof IP66
Camera Features IR Led 36 pcs
IR Irradiation Distance 10m~20m
S/N Ratio > 48dB
Video Output 1.0Vp-p/75Ω BNC
White Balance Automatic
Backlight Compensation Automatic
Shutter Speed Automatic electronic shutter 1/60-1/100000 Sec
Physical Environment Power Supply 12V DC
Material Metal Shell
Application Outdoor/Indoor
Connector BNC,DC
Operating Temperature -10°~ 50°C (14°F~122°F)
humidity Below 90%RH