Bosch Building Technologies

    Showing results for 
    Search instead for 
    Did you mean: 

    Security: Video

    Sort by:
    100% helpful (1/1)
    ‎05-14-2018 11:09 AM
    Network switch has port security on and shuts down a NetApp iSCSI data port (e.g. CH3). This article is only relevant in aspects of network security / port security where MAC addresses are analysed. Some network security applications are capable of sniffing network packets thoroughly enough to pick up MAC addresses on E-Series Controller ports that are not seen in the Storage Array Profile data.
    View full article
    ‎05-14-2018 10:56 AM
    Memory leak on a Divar IP 7000 R2 triggered by Catalyst Control Center.
    View full article
    ‎05-10-2018 11:59 AM
    Japanese characters in file names are displayed as garbled text after you decompress a .zip file in Windows 7 or in Windows Server 2008 R2.
    View full article
    ‎05-07-2018 10:54 PM
    In December 2017 information about two vulnerabilities in modern processors were published. These exploits are often referred to as Meltdown and Spectre. Due to the nature of the flaw, many processors(AMD, ARM, Intel, etc.) are considered vulnerable. In order to use the exploit, an attacker needs to execute malicious code on the target system. It is thus generally advised to protect systems from unauthorized access (e.g. by using a strong password policy). BOSCH IP Cameras and BOSCH Encoders are based on Common Product Platform (CPP) designs. Each CPP uses a specific System-on-Chip (SOC), or a family of SoC’s, which inherit various CPU cores. Some of them include ARM cores, which are considered vulnerable. We therefore have analyzed our Common Product Platforms if they are affected, with the result: • Our Common Product Platforms CPP-ENC, CPP3 and CPP4 are not affected by the vulnerabilities. • The processors used in the SoC’s of our Common Product Platforms CPP6, CPP7 and CPP7.3 are affected. As we do not allow 3rd party code being installed or executed on our cameras, successful exploitation is considered not possible with Meltdown or Spectre. In short, our IP cameras and encoders are not vulnerable to Meltdown or Spectre exploitations. In general we recommend to always keep your device Firmware up to date.
    View full article
    100% helpful (1/1)
    ‎05-07-2018 10:33 PM
    In the Manual of the VideoJet decoder 8000 at Point 6.1: Setting up the decoder with Configuration Manager Before you can operate the unit within your network, it must have a valid IP address for your network and a compatible subnet mask. Notice! As a default DHCP is enabled in the unit’s network settings. With an active DHCP server in the network you must know the IP address assigned by the DHCP server to operate the unit. The following default address is preset at the factory: The correct inital IP address is:
    View full article
    Top Contributors