Software Index
Windows Software Security Tools  

i-Catcher Console 5.2 B

download download home home   report broken
important software information
company name:
iCode Systems Ltd.
license: Shareware
minimum requirements:
functional limitations:
i-Catcher Console 5.2 B description
i-Catcher Console will provide a complete scalable CCTV system, with motion detection, remote web interface, alerting, simultaneous record & playback, scheduled activity, device control, and flexible display options, exceeding the standards you'd expect from a modern digital CCTV system. i-Catcher Console uses a wide range of camera devices, including USB webcams, capture cards (for connection to conventional analogue CCTV cameras), and the latest network/IP video servers and cameras. Because of its modular design, you are not limited to one type of device for the whole system - you can mix devices as required. i-Catcher Console also works with PTZ (Pan, Tilt & Zoom) cameras to not only provide a remotely moveable CCTV camera, but also provides auto-tracking - the camera can move to follow movement through a monitored area. Motion detection is performed without the need for PIR triggers and external motion detectors. Once motion is detected, recording begins. For extra security, i-Catcher can record before and after the motion event to ensure you capture everything, and sensitivity controls add an extra level of flexibility. Digital image storage means that access to stored images is instant, and allows you to playback the footage while still recording, as well as a loop play feature, to continuously loop the most recent activity - features traditional CCTV systems are simply unable to provide. With digital image storage comes simple yet comprehensive systems for image management. Archiving automatically ensures you retain the right amount footage, image integrity checking ensures your footage isn't tampered with, and feed management allows you to precisely control the storage of images per camera feed. i-Catcher Console supports I/O input and control through a variety of interfaces, allowing almost any remote control configuration (subject to use of controller hardware). We have set up a web page that uses our Console with an Axis 241Q video server to demonstrate both remote control of appliances and the simple means to embed control of devices into your own web pages. See our i-Catcher Console-based remote device control systems. The flexibility and simplicity of the user interface is available remotely, and yet requires only a web browser for use. No ActiveX controls are needed, no software needs to be installed. The remote interface provides a full live feed view, with digital zoom options, control of PTZ cameras, multiple simultaneous feeds, and image quality settings to improve performance through bandwidth reduction. Playback is also provided with all the options of the local playback facility, and most of Console's configuration can be adjusted through remote administration. All of these features can be password protected at many levels to provide a powerful security system.Release notes: New ReleaseTE Improved H.264 rendering performanceTE Velleman Relay Board automation supportTE I/O Device power usage recordingTE Streaming RS232 sensor supportTE H.264 Synchronised playbackTE X10 RF Command supportTE X10 Dimming supportTE iDomain Remote Automation ControlTE Drag and drop synchronised playbackTE Sanyo PTZ SupportTE Layout switching as an action from alerts, sensors, etc.TE Automation control permissions [ i-Catcher Console full changelog ]
Similar software
LAlarm - Free Laptop Alarm 5.7 B (Popularity: ) : LAlarm is a free laptop alarm. LAlarm emits a loud alarm sound when a thief tries to steal a laptop and it recovers and destroys sensitive data if the laptop is stolen. Besides, it alarms when the battery is under ...
Secret Keeper 1.5.2 Beta (Popularity: ) : Secret Keeper is a simple program designed to help you store the user names and passwords to the many websites and applications that you need them for. This information is protected with a password that you choose.
LuJoSoft DeskLock (Popularity: ) : Introduction LuJoSoft DeskLock is an easy in use and compact tool for quick computer locking when you leave it unattended. It shows a lock screen, disables any user from accessing your pc. You can lock your PC by double clicking ...
Trust Delete (Popularity: ) : 7 Unique Features of Trust Delete (1)Remote Data Delete: remotely delete your files in the missing PC through the Internet with just a simple click. -Activate data delete via the Internet. -Choose from pre-set lists for easy settings, including My ...
Audio Watermarking Tools 2 (AWT2) (Popularity: ) : Audio Watermarking Tools 2 (AWT2) of www.audiowatermarking.info are software utilities for embedding (and extracting) short data payload within audio streams (wave files). The tools are distributed as a package of GUI and console utilities running on Microsoft Windows 7/Vista/XP/NT/2000/Server, Apple ...
ProtectStar Data Shredder Professional (Popularity: ) : The new version 2.5 Professional of ProtectStar Data Shredder is now available as download and as a free upgrade for current clients. The professional award-winning Windows software for secure deletion of data and storage including state-of-the-art deletion logs ushers in ...
LuJoSoft FileShredder (Popularity: ) : Introduction: FileShredder is a simple application that can be used for deleting unwanted files on your hardrive. We all know that windows don't realy deletes files on you drive and with software like Ontrack EasyRecovery, PC Inspector File Recovery and ...
Internet Cleanup Mac (Popularity: ) : Hidden surveillance programs can be lurking on your Mac recording what you type, where you browse and even taking snapshots of your screen. Fight back with Internet Cleanup 5.0! Detect, prevent and delete the implements of Internet invasions! Highly specialized ...
HomeCenter-remote control PC by mobile (Popularity: ) : Remote control and access your PC by mobile phone anytime and anywhere. Support Java J2ME mobile since MIDP 2.0, Android 1.6 or later. Free, TCP+UDP system, auto UPnP support, connect mobile and PC in any firewall. add shortcut keys for ...
1 Smart Protector Pro - Internet Eraser (Popularity: ) : Smart Protector Pro is an easy to use software that protects your privacy by erasing all the traces of your Internet activity automatically. It completely erases your Internet Explorer history, cookies, temporary files(cache), typed URLs(the drop down address list), AutoComplete, ...
Zer0 (Popularity: ) : Zer0 is a user friendly file deletion tool with a high level of security. Using Zer0, users will be able to erase files and prevent file recovery by a third person. So far, no user reported an efficient method to ...
NIC Padlock (Popularity: ) : NIC Padlock is designed to allow a system administrator to either temporarily or permanently disable a remote systemOCOs network interface cards (NICOCOs). NIC Padlock also supports enforcing that all adapters are enabled on the remote system. A quick summary of ...
User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
Similar scripts
Centos 5 PHP-5.2 RPMs (Popularity: ) : RPM rebuilds for Centos 5 of version 5.2 PHP. These packages are built from Fedora 10 SRPMs and taken from instructions at http://wiki.opencsta.org/index.php/Centos_5_with_PHP-5.2
Cummulative (dim 2) products across all permutations of distinct column-indices (Popularity: ) : CUMmulative PRODucts across All Permutations of Distinct Column-IndicesThis function returns the cumulative sum over products of column elementswith all permutations of unique and distinct column-indices.The sum excludes automatically products containing elements with commoncolumn index values. In addition, any user specified ...
Schur Stability Test of 2-D Polynomials (Popularity: ) : Schur Stability Test of 2-D PolynomialsCopyright (C) Yang XIAO, Beijing Jiaotong University, Aug.25, 2007, E-Mail: yxiao@bjtu.edu.cn.The stability of 2-D discrete systems (2-D IIR filters and 2-D ARMA models) can be determined by the Schur stability of characteristic polynomials of the ...
I loe this 5.x-1.x-de (Popularity: ) : The module keeps a list of page lovers.InstallationUnpack in your modules folder (usually /sites/all/modules/) and enable under Administer > Site Building > Modules. Key features "I love this": · a button to say I love this page · an alternate ...
Neuro-fuzzy classifier (Popularity: ) : It is known that there is no sufficient Matlab program about neuro-fuzzy classifiers. Generally, ANFIS is used as classifier. ANFIS is a function approximator program. But, the usage of ANFIS for classifications is unfavorable. For example, there are three classes, ...
Solving non-linear and linear simultaneous equations with fsolve (Popularity: ) : solvesimul.m can be easily adapted to solve more equations but as it stands it will solve 2 unknowns in 2 equations (1 non-linear and one linear).To solve equations of this form... a*x + b*y = A (1) a1*x^2 + b1*y^2 ...
PSO solution to economic dispatch (Popularity: ) : This software contains two examples psotest.m and psotest.1.By running the programs(psotest.m or psotest1.m) as they are in the default pso1 folder the economic dispatch problemcan be solved. The allocation minimum fuel cost and transmission losses are determined.3. I am using ...
CtrlLAB (Popularity: ) : CtrlLAB is a group of MATLAB functions which provide graphical interface to perform feedback system analysis and design tasks. The facilities provided by CtrlLAB are: a) model entering, including SIMULINK modeling b) model display c) system state space realisation d) ...
Polynomial coefficient vector derived from sub-polynomial factors (Popularity: ) : For given p(x) = PROD[i=1,m]{SUM[j=2,n+2]{(A(i,j)*x^(j-2))^A(i,1)}} we shall get p(x) = SUM[s=1,N+1]{p(s)^(N+1-s)} For example If p(x) = (x-4)^5 * (3x^6-7x^3+5x+2)^2 * (x^3+8)^3 * x^2 or A = [ 5 -4 1 0 0 0 0 0 2 2 5 0 -7 0 0 3 3 8 0 0 1 0 0 0 1 0 0 1 ...
Advanced Dijkstra's Minimum Path Algorithm (Popularity: ) : DIJKSTRA Calculate Minimum Costs and Paths using Dijkstra's AlgorithmInputs:[AorV] Either A or V where A is a NxN adjacency matrix, where A(I,J) is nonzero if and only if an edge connects point I to point J NOTE: Works for both ...
Screenshot
i-Catcher Console 5.2 B
Rate me
supported os's
Windows 7
    Windows 7
Windows
    Windows Vista Starter
    WinXP
stats
downloads 5
price $215.44
version 34
size in Kb 5,325
popularity   
755/1272475
user rating 5/10
our rating 0 Stars
share info
Recommend i-Catcher Console 5.2 B
Report spyware
New Software
Popular Software
Latest Reviews