www.1001TopWords.com |
Alarm System Keypads
The keypad is the device you and your loved ones will interface with daily. It is typically placed at one or more of the following locations: * House to garage door hall. You need at least one keypad to communicate with the control panel. If you elect to have only one keypad you should have it installed as close to the door you use most often as possible. Even if you or others sometimes use a different door, you can put it on its own delay zone and have a longer entry time to get to the keypad from that door. There are different levels of keypads available for each model of control panel. The one that the dealer uses as their basic model varies by company. The choice of keypads is usually made for you as sales persons tend to stay away from technical discussions even if they do know the difference. If you know that you have a choice and find out what your options are you can make sure that you get the keypad that will work best for you. Following is a general list of the main differences: * LED- (light emitting diode) This keypad has many lights to tell you what is happening such as a green light for ready to arm, a red light for armed, a yellow light next to a zone number to show you which zone is open if it is not ready. * LCD- (liquid crystal display) This keypad uses a display window to tell you what is happening such as "System armed", "Zone 4 open" * ALPHA(alpha-numeric readout) This Keypad can be programmed to give you descriptive readout of what is happening with your system such as"Tommy's window is open", "Alarm violation, Basement Motion" * Large display area is important so that you don't have to squint to read it. * Some windows are not back ?lighted so you have to turn a light on to see what's happening. Make sure your window and number keys have lights built in. * One touch arming lets you turn the alarm on the way you want without entering a code such as Away, Stay (bypass motion detectors), Instant (Make delay doors instant) etc. * Exit buttons on some keypads allow you to open a door for 30 seconds if the alarm is on. This is handy for letting your pets out and back in without having to disarm the system. This is also a great feature if someone in the house has to exit in the middle of the night. * Panic buttons for Police, Fire and Ambulance are on most keypads. Make sure you don't have to contort your fingers into strange configurations to use them. The better-designed keypads are the easiest to use. * Your keypad should have the ability for the alarm owner to program in a code for each user. Some people use one general code for the whole family and have a different one for the real estate agent, builder, maintenance companies, boy or girlfriends that they don't expect to be around that long, baby sitters and so on. You can easily remove a code at will, and the more sophisticated systems have a timer on how many times a particular code can be used before it erases itself if desired. Having different codes for employees at your business is important for obvious reasons and many high-end systems can track what time a code user entered and exited. Some like this feature at home to track what time the cleaning service or their teenagers entered and exited. (you would need an alpha keypad to read such information) Some systems can hold up to 40 different code users. * A "distress code" should be able to be programmed into your system. This is a code that will be easy to remember for the whole family. When the system is turned on or off with this code it simulates normal function while notifying your monitoring company that you are in a hostage situation. Almost all systems have the ability to have this programmed in and it amazes me how many people I have consulted that didn't know they had a distress code. Make sure this is discussed when you are choosing an alarm, as it is one of your systems greatest features. (HOT TIP!) Lets take a look at how easy it would be to use your keypad by reviewing some common every day scenarios. The flexibility and complexity of how your keypad can be programmed often scares people into thinking that an alarm would be hard for them to operate. It is important to remember that once your alarm system is set up to your specifications by your installer, it is quite easy to use. Most of the keypads on the market are designed for use by anyone who is older than 7 years old. The systems will even have your bypass requirements for motion detectors and interior traps pre-programmed so you can make several things happen with the push of a well- defined button. When I think about how many pages of paper it would take me to create scenarios for every keypad on the market, I envision an empty forest somewhere with no wildlife in it. In an effort to show you how easy your alarm is to use I will give you a general set of situations that would pertain to my system of choice. The slight differences you might see if you used a different keypad are often subtle things like having to press two buttons instead of one. So in the interest of me doing my part for earth conservation today, I will limit myself to a general use mode. Leaving the house- If all the devices on your system are ready to be turned on meaning doors are closed, windows are closed, nobody is walking around in front of a motion detector etc. Your system will display "Ready". If any thing is not ready on your system your keypad will display its location so that you can know where to go to make it ready. The keypad would say "Zone 2 open" or "Back door open" if you have an Alpha keypad. If multiple areas are not ready it will scroll through all of them. Press "AWAY"- This will tell the control that you are leaving the house and want all devices including the motion detectors armed. The keypad will begin to emit a beep at 1-second intervals. This is your systems way of saying to you "Have a great day, goodbye!"The exit counter is usually set for approximately 60 seconds but can be longer if your lifestyle requires a longer exit time. Once the exit time has expired your system is "ARMED" and is protecting your house or business. Returning home- When you come home you will enter through a door that has been pre-assigned as a delay door. As you open the door the keypad emits a steady welcome home tone. This entry delay time is usually set for approximately 30-seconds but once again can be tailored to your lifestyle. The system needs you to enter your complete code (3 to 8 digits) to turn off your system so it will not go into an alarm condition. If you entered through a delay door first the system will let you walk in front of a motion detector if needed to get to the keypad, for the complete entry delay period. Turning your system on for the evening- When you are staying at home you will want to turn on your perimeter system but not your interior devices such as motion detectors on the main floors. Press "STAY"- This will let the system know that there will be activity inside the home so it will turn off the assigned motion detectors and any other interior traps you may have. It will arm the perimeter doors, windows, glass break detectors and any other perimeter devices you may have. In the STAY mode the system knows nobody is leaving so it does not emit a goodbye countdown from the keypad. If nobody leaves through the doors within 60 seconds or so, the system will remove the entry delay time from your usual delay doors. This means that if someone opens even a delay door while you are armed in the stay mode the alarm will sound instantly. If someone does leave within 60 seconds or so, the system will activate the entry delay so they will get a welcome home tone and time to disarm upon their return. Disarm in the morning- When you are ready to turn your alarm off simply enter your code. The red armed light turns off. Returning home to a violated system- If your system was violated while you were away the siren will sound for a pre-programmed period of time. After this alarm time expires the systems will re-arm preparing for a second attempt. When you return home the keypad will be emitting a high pitch and rapidly beeping tone. The keypad will also tell you where the security breach occurred in the order of violation. If you hear such a tone on your return you should LEAVE IMMEDIATELY! as the burglars may still be in the house. Go to a neighbor's house and make sure the authorities clear your home as safe to enter before re-entering. When it is safe to return just enter your code to reset the violation alert. This is yet another way that your system protects people as well as property. This feature coupled with the distress code is for me the best reasons to have a system. When you are thinking about what is irreplaceable in your home I hope you are placing your loved ones and yourself at the top of that list. On the lighter side there is the opportunity to eliminate another future worry from your life. There is nothing better than returning home and knowing as you unlock your door that nobody has been or still is in your house. If you open the door and hear a normal welcome home tone, all is well. If your keypad was removed forcefully by an uninvited quest, you will not hear your tone and you will still suspect that something is wrong. The scenarios I have just gone over with you will pretty much cover your daily use of your security system. As you can see the system is not complicated for you to use.The Percentage, by which you decrease your likelihood of being a victim, far exceeds the inconvenience of having to learn something new. Matthew Francis Alarms@expertsknow.com 22 year veteran of the alarm industry
|
RELATED ARTICLES
Home Security System, You Are A winner Have you ever been to a local trade show or fair and filled out a raffle and later you find out you have won a Home Security System? Well, you are not alone. Sometimes everyone one wins. That's right you are not as lucky as you think you are. Well you are lucky in one regard; home security systems do work, not only do the little flags out front of the stickers near the front door help prevent crime, but an alarm sends the culprits running big time. Infoscams In this article I am going to talk about those infomercials that are obvious scams. Which ones are they? They are the ones promising you, that by following their system you will make thousands part- time and tens of thousands full-time. Or, they invite you to come to a free seminar where they can tell you about their secret money making system. Let's first look at the ones that offer a money making system, they go something like this. What is Your Security Awareness IQ? Are you aware of the need for security? Fire Safety Tips Did you know that fire is the third leading cause of accidental deaths in the United States, yet most people ignore it. More than 150 workplace fires occur every day. So many of theses untimely deaths could have been prevented if they only had a plan. How to Buy a Safe for Your Home The first step is to determine who or where you will buy your safe from. There are many places to buy a safe today, you can buy from a "big box store", an office supply store, a furniture store, a hardware store, online, or even from a professional safe retailer or locksmith. Handling Weather Emergencies: Part 1 - Forward Planning Makes The Difference Introduction Someone Spying? Someone Spying? So are the Teddy Bear and the Potted Plant How to Keep Your Postal Mail Private and Secure Surreptious opening of most envelopes sent through the mail takeslittle effort and only minimal skill. Instructions are readily available on the Internet and in books suc as "CIA Flaps and Seals Manual"(Paladin Press). Eavesdropping and Counter-Measures: Technology and Techniques You need to know how to protect yourself, since your security department or any consultant may not be truly aware of these threats and therefore not dependable. Since September 11th, a number of businesses entered the security field with little to no knowledge of the trade itself; only of its profit potential. Even outfits that have been around for some time and well-established have not been able to stay current with the latest innovations.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.We'll start acoustic ducting evaluation is the inspection of air ducts, baseboard heaters, coffee rooms, lounges, bathrooms or any way the architecture of a building can transfer sound. A simple example is to put your ear to a wall and listen. Basically anything that requires the use of the naked ear is called an acoustic bug. Softer surfaces can help muffle sounds but there are more efficient means out there. So be aware that the way an office site is designed can act as a conduit for conversations. Also, be aware of any changes can have adverse affects. Simply playing music can do wonders for masking conversations.Inspection of telephone equipment and wiring is called line analysis. This is trickier than it seems since sometimes a possible weakness has an actual purpose to the telecommunication system. Especially if it requires constant maintenance and software upgrades.All instruments should be opened and inspected. Ideally they should be compared with a known safe phone or device. If you're not sure, just remove that piece of loose components and wiring and see if the phone still works. The wiring can be modified in a switch within the handset that essentially turns it into a microphone. If you bypass this hook switch, you can listen in from anywhere on the landline. Technicalequipment won't be able to detect this. Time Domain Reflectometry is the sending of a pulse down a telephone line. If there is some sort of disruption; a wall outlet or wiretap; a portion of the pulse will besent back to the device called a Time Domain Reflectometer (TDR). Then the time difference between the reflection and the continuous run is measured. This helps in determining the distance to the anomaly.These devices can perform all sorts of diagnostics including mapping a wire network. That can be useful in locating a hidden phone. Hidden phones have several obvious uses such as making long distance phone calls to being placed in an office across the street to receive betting requests by bookies; a practice called back strapping. If you open up the modular jacks where you connect your phone, you'll usually see four wires. In most cases only two wires are connected; commonly known as ring and tip. If you see all four connected, be aware that is not usually consistent for most wiring situations, especially in homes. The other two wires could be used for a bugging device.For instance, the microphone you use in a voice recorder can be cut in half. Connect the mike head to one set of unused wires anywhere on the phone wire. Then, so long as there are no breaks in the wire, connect the other end to the jack that connects to your recorder. Now place your recorder to be VOX (voice) activated and now you have an extremely reliable bug. By the way, this should be manually inspected for since using a specialized bug detector may see nothing wrong or inconsistent. A bug such as this that connects to a wire is called a direct tap. The other general type is called an inductive tap. This is when an instrument is outside a wire but can still distinguish what's transacting over a wire. They are harder to detect since they don't draw power from the line such a standard telephone would. These are referred to as snuffle bugs. A simple probe used in hunting wire signals has a speaker, which can display sounds. Byaccident one day I was working on an apartment intercom system while using a probe. I could hear conversations throughout the building quite clearly just through the intercom boxes mounted on walls from the master unit in the basement.If you're using wireless headsets or cordless phones, the radio signals can be intercepted. A cordless phone acts like a radio, but depending on the frequency and a few other factors, can make interception extremely difficult. With some manufacturers, you can buy the same model as your neighbors or the office and have it join their phone system. Double check Caller ID boxes to see if they also record numbers dialed besides obviously those being received. If you're using VOIP (Voice Over IP), remember that calls can be recorded in a fashion identical to intercepting data between two computers. These packets of data can reassemble an audio file. Obviously electronic devices possess semiconductor components such as diodes, resistors and such. The method to hunt for these components is called Non-Linear Junction Detection (NLJD). The NLJD unit emits a radio signal while listening for the return signal from an electronic device. This becomes very useful when a bug is embedded in a picture frame or wall. The eavesdropping device doesn't have to be active for it to be discovered. If a device is active and transmitting wirelessly (or even on a wire), you can detect it with a Radio Frequency Spectrum Analyzer. Depending on the detection device used, you can determine whether voice, data or video is being sent, and possibly listen to the data. Try to use different size antennas or buy one that collapses. Different frequencies can be detected more efficiently by using various sizes. The use of filters with antennas can also help pinpoint devices on specific frequencies. Electronics such as computers, FAX machines and especially CRT monitors can radiate electromagnetic signals or pulses that can be received by other equipment. This is known TEMPEST. One way to complicate the surveillance of this is to use certain fonts and line walls or equipment with different gauges of copper mesh wire. You can further enhance this posture by using special paints, which block radio transmissions. Radio waves will look for a leak or break, so be careful of defensive applications. One-way window tints can help in blocking signals. Since an electronic device could generate some heat they can be detected in another way. The use of a thermal imagery device can detect and actually see minute amounts of heat radiated for your viewing. You can hide the heat signatures by using creams or neoprene. Technology exists to collect information from blinking LEDs of modems, routers, print servers and similar devices. You can only see some general blinking but with the use of properly tuned optics, filters, oscilloscopes and good timing you can discern much more. One of the LEDs on your keyboard can be altered to blink while you are typing in a fashion similar to Morse Code. You can also use a tap in the keyboard that sends out radio waves again similar to Morse Code and no anti-virus software will ever be able to find it. Even when a CRT computer monitor is facing a wall the light can be in a sense read by its flickering emanations from some distance. A good defensive measure is to buy new LCD flat panel types.Another approach to attacking FAX machines is to simply record the noises it makes and play it back to another machine. I used to do this for a client so they could keep a record of all the faxes they made and received. There are creative and potentially illegal defenses against wiretappers and Peeping Toms. One is to transmit an extremely high pitch down the wire, thereby rupturing the listener's eardrums. I knew someone who once sent a powerful electrical spike down his phone wire thereby destroying his divorced wife's recorder. By the way, this leads to another topic-expect the device to be discovered someday. Don't leave your fingerprints on it. He found it and had it dusted, thereby producing some prints. My friend used this as leverage against the Private Investigator that planted it. Advice to Private Investigators, a word to the wise: if you do this part-time, hire someone who does this full-time. This P.I. lost his license and almost went to jail. The lawyer who recommended him got into a lot of trouble as well. He received some unwanted attention from the Feds because of his telephone dealings went across state lines and also happened to involve the Post Office. There is another budding field related to this topic called Protective Intelligence. Currently there are only a few experts who do this kind of work.A laser or an infrared beam can be used at a considerable distance from a target building. Conversational sounds can vibrate unto solid objects such as windows. The beam's reflection varies in relation to the movement to the window, which is received and converted back into something audible. To mask the sounds, you could attach a vibrating device (basically an altered electric razor) to the window.Of course if the window is open, then a laser can target another object instead of the window. A beam of light or laser can be directed to go through a window onto a solid object thereby nullifying such defensive measures again. Generally you really can't detect such attacks unless the laser, infrared or light beam is being used that moment. Certain materials can be used to detect IR emissions, as well as the use of passive night vision gear. Certain fabrics or even a curtain may actually show the spot where a beam of light or laser is being focused. Unless the room is dusty or you have an artificial can smoke, you can follow the beam up to a point and guesstimate it's location. One type of optical bug is an infrared transmitter. When placed in the area of interest for transmission of the conversation to an infrared receiver which will then translate the conversation into an audible format.Many of these same procedures used can be applied to locating hidden cameras. A relatively new device uses a series of lasers to seek out optics. This wasoriginally intended to locate snipers by bodyguards.I have listed the techniques, counter-measures and then the counter to the counter-measures to prevent any false sense of security. Usually constant vigilance is your best weapon besides knowing what to look for. Even if you find a "bug sweeper" with good credentials, certifications and experience, ask them detailed questions. Not just to test them but also for your own peace-of-mind. This makes our job easier and we appreciate greatly when dealing with knowledgeable customers. Pepper Spray Considerations Choosing the Right Pepper Spray Alarm System: Smoke and Heat Detectors Smoke & Heat Detectors- Smoke detectors are available that will interface with your security system. The smoke detectors that are already in your home can't be tied into your security system. The device that the builder put in your home is either electrical, battery operated, or in some instances both, if you have the better quality detectors. Lifesaving smoke detectors should be in every home. If you elect to add some to your system, your existing detectors should be left in place, as they are still able to help give early warning in case of a fire. Avoiding Pickpockets Every year, thousands of senior citizens fall prey to the quick and clever tactics of pickpockets and thieves. What may take thieves a moment to "lift" from your pockets (passports, credit cards, and airline tickets) may take weeks to replace. It is difficult to recognize these changeling thieves sometimes the well dressed businessman standing next to you who just dropped some coins, at other times the "friendly" group of young children with newspapers approaching you in a city subway. A thief may be hard to recognize, but their time tested tactics are not. When traveling or in your home area you can prevent the majority of common thefts by arming themselves with the knowledge of typical scams, following some basic travel safety tips. Home Security After An Earthquake After an Earthquake you need to do an immediate damage assessment. First go turn off the gas if you smell anything, a leaky gas line could explode and take out your entire home and your cats nine lives. Look for cracks in the slab or any areas where the house carpet is lifted up. Then walk around the exterior of the house, what do you see? Do you see downed fences, retaining walls, support structures holding up the garage at weird angles or any areas where your house was knocked off its foundation? Look also for water pipes which have been broken, if so shut off the main water line coming into the house. If there is extensive damage then that means the other neighbors have also and the entire area. Securing Home Water Supplies; Conservation of Water Planning Generally when it rains the water runs off the house and yards into the gutter and into pipes or storm drains which feed it into the river, stream or ocean. This conventional approach is problematic in that many of the countries regions are in severe drought. As we expand our population base we will see issues where the growth and water usage far exceed the regional annual rainfalls. This will indeed over tax the water supplies and cause issues with exacerbated droughts and lengthy recoveries. Eventually if kept unchecked we will be in perennial drought in most of our nation. Numbers That Can Save Your Life It's one of those things we don't give a second thought about. Many of us move into a house and never even change the number that's on the house. Why should you, it's the right number and that's all that matters. Well it may be the right number but can you see it at night or from the road? If there is an emergency and you have to call an ambulance, you certainly don't want them wasting valuable seconds looking for your home. Having a visible house number both day and night is critical. Home Security: Your Yard is the First Line of Defense You may not believe it but most burglars do not plan their break ins. They are crimes of opportunity. They pick what appears to be a simple target. If they see a greater risk than they anticipated, they move onto a safer target. Therefore the more effort you take to keep your home from seeming to be a simple target, the safer you will be. Infrared Goggle Pop Down in Hallways for Structure Fires Most people who are killed in structure fires die from the smoke not the flames or fire. Generally they are overcome by the smoke and lack of oxygen as the fire takes all the oxygen and replaces the airspace with smoke. There needs to be a way to get these people out of the fire situation and structure immediately to prevent loss of life, however without good visibility one cannot see to get to a fire escape, stairway or exit. Alarm System: Wireless Remotes WIRELESS ALARM SYSTEM REMOTES Is America Safe? As the devastation and death toll from deadly Hurricane Katrina becomes more apparent, it is a grim reminder that we live in dangerous times. Is Big Brother Watching You? Or Are You Watching Big Brother? Isn't technology a wonderful thing? I thought this as I received the text to my mobile phone telling me that my home security camera had detected movement. Someone or something was where they shouldn't be at the rear of my house and I was 2000 miles away on vacation ? yet I still knew they were there. Fortunately the text wasn't followed up by another from one of the sensors on my windows telling me that someone was breaking in and it was urgent I did something about it. |
© Athifea Distribution LLC - 2013 |