Setting up ispy for covert surveillance. ISpy - monitoring a room using a microphone and webcam


iSpy is simple application, which provides the ability to monitor any room using a camera and microphone. Whenever there is movement or sound in the room, the utility automatic mode transmits a signal to the user.


Using this program you can set up surveillance of a store, warehouse, office, etc. You only need to install cameras, microphones and configure their functioning. After this, the user will receive messages by email or SMS whenever there is movement or sound in the room.

The utility has a Russian-language localization, which allows for quick and convenient configuration. The application is distributed absolutely free, which allows anyone to download it.

How does the program work?

After launching the application, you need to add your existing hardware to it. In addition, the user can work remotely and use the device for monitoring third party computers. Having prepared everything necessary equipment, you can start setting up the broadcast of sound and image via global network, which will ensure that surveillance data is received on another PC and smartphone.

Using remote commands, the user has the opportunity to add a recording function during any movement, set recording conditions, and configure messages. If desired, the user can upload the resulting video to the hosting without leaving the program.

In addition, it is possible to set a password to limit access to the program by strangers. The utility can be installed on all Windows operating systems.

Possibilities

The program allows you to organize monitoring of a specific room using only a microphone and camera. In addition, you can use a virtually unlimited amount of equipment. In addition, it is possible to record video. The utility also provides the ability to set a password to access it.

iSpy can automatically start recording when an alarm is detected. In addition, it is possible to post filmed video for hosting. In addition, the application supports remote use.

Advantages and disadvantages

The application sends messages to the user's phone or email when motion is detected in the room. In addition, it is possible to broadcast sound and image via the Internet. In addition, you can fully control the operation of the microphone or camera.

The utility is also capable of sending frames from the camera to email. In addition, it is possible to expand the functionality of the application by adding plugins. In addition, the utility has a menu translated into Russian. It is worth noting the simple and clear interface. In addition, the application is distributed absolutely
It's free and anyone can use it.

Among the disadvantages, we can note the cost of messages to the phone and
email. In addition, it is necessary to create own account to be able to use some functions.

In general, many who have used this application leave only positive reviews. Despite the fact that the program is distributed free of charge, it offers a huge range of functions and capabilities for monitoring a specific room using a microphone and camera.

A special feature of the application is the broadcasting of sound and images via the global network and distant work. You must download the program from official resource developer to have high-quality software on your computer. In this case, it is necessary to check all downloaded information for viruses.

iSpy is a simple application that allows you to monitor any room using a camera and microphone. With every movement or sound in the room, the utility automatically transmits a signal to the user.

Using this program you can set up surveillance of a store, warehouse, office, etc. You only need to install cameras, microphones and configure their functioning. After this, the user will receive messages by email or SMS whenever there is movement or sound in the room.

How to work with the program. To do this, read the instructions below.

First, install the webcam driver, then launch the iSpy program.

1. Go to AddWebcam.

2. In the tab Local devices select your webcam, install required permission video.
Click OK.

3. Capture settings open. Let's go to Motion Detection, Trigger Range allows you to set the motion sensitivity.
Below in Zone detection Using the mouse, you can select the necessary area to capture movement in the frame.

4. In the tab Alerts celebrate Alerts enabled by clicking on the buttons with three dots opposite Run file And PlaySound.
If you want to receive SMS or e-mail when motion is detected, you need to register the program - OK.

5. Now the main iSpy window displays the image from the webcam, below are buttons to control the recording.

6. After capturing, the video is displayed at the bottom of the window; you can view it with the built-in player or delete it.

Fine-tuning the iSpy program

Connecting to an IP camera

To connect to an IP camera you need to know its address in local network and port as well as protocol.
To add a camera, click the “Add” > “IP Camera” button. In the MJPEG URL field, enter the IP address of the camera. If the connection to the camera password protected, then enter your username and password.



Click “OK” and you will be taken to the camera settings window.


Here you can adjust the number of frames per second in monitoring and recording mode. We also set the format of the time stamp that will be superimposed on the video.

Setting up motion detection and recording

To configure the motion detector, go to the “Motion Detection” tab.


Here you can select the detector type and adjust its sensitivity. By default, the “Two Frames” detector is used - compares two adjacent frames. If the change (in percentage) exceeds the specified value in the “Trigger Range”, then movement is considered to have occurred.
Next, go to the “Alerts” tab. Here you can turn on an alarm for the following events: motion detection, absence of motion, appearance of a certain number of objects in the frame. You can also download additional plugins, for example - recognition license plates. If you click on the button opposite the “Mode” mode, you can set a delay during which the condition must be met, after which the alarm will sound.


The Intervals button allows you to set the time after which the alarm is reset.
At the bottom, you select the action that needs to be performed in response to an alarm: sending Email, SMS, Twit and others.
Now let's move on to setting up the recording. Open the “Recording” tab and the first thing you should do is set the initialization time of the camera after turning on “Max. Calibration Delay”—during camera initialization, no alarm or motion detector is triggered.


Next, set the parameters “Inactivity Record” and “Min. Record Time". The first sets the number of seconds of recording after the end of the movement, the second sets the minimum length of the entire recording. The smaller these values ​​are, the greater the number of video files that will be output.
If desired, in the “Trigger Recording” line you can select a camera that will start recording simultaneously with the current one.
Now it remains to determine the folder where the video recordings will be stored; to do this, go to the “Storage” tab. To add new folder, click on the button opposite “Media Location” and get to the global settings section.



Click the “Add” button and add a new location - network drives are also supported.



You can also set a limit on the size of the archive and the period for deleting old records.

Connecting a microphone to the camera

If you need to record sound, you can add a microphone to the camera. A microphone is added to iSpy as separate device. Click ADD > Microphone, now depending on the type of your camera you need to specify the correct URL of the audio stream. In this example, the audio is transmitted in Wav format.



Click OK and get into the microphone settings. The settings here are almost the same as for the camera. It is necessary to configure sensitivity and, if necessary, alarm and sound recording. In order to bind a microphone to the camera, you need to click on its settings button and specify the desired microphone in the window that opens.

And finally, an overview video of the program’s functions.

Software package iSpy represents universal system tracking, which uses web cameras with microphones and motion sensors.

In other words, this is a security system that has quite serious capabilities and belongs to the category of professional software.

iSpy program features

The possibilities of iSpy, although not limitless, are quite large. It’s worth saying right away that the entire complex operates in real time with video display and sound playback from simultaneous recording on HDD. That is, everything that you see on the monitor at a certain point in time is immediately recorded. The convenience of using such comprehensive protection also lies in the fact that the program allows you to work on several computer terminals simultaneously. In addition, there is the possibility of remote access and control of absolutely all parameters and settings. If you use multiple computers simultaneously, you will need remote user authorization.

By the way, the number of cameras, microphones, motion sensors or connected users is completely unlimited.

In this case, you can use several display modes on the monitor screen, say, several cameras simultaneously, or for each camera separately. To do this, you can use the corresponding function. In addition, the File menu has functions for switching the cameras and microphones themselves (even while viewing, for example, the plan of each floor). In the same way, the function of broadcasting to the Internet is easily activated. There is a corresponding button on the panel for this purpose.

If we talk about saving information, then it must be said that the recorded material is quite easily converted into a universal format Adobe Flash and can be viewed on any software player or web browser (of course, subject to availability installed by Adobe Flash Player). Among other things, you no longer need to save large quantity footage directly onto your computer's hard drive. To do this, you need to set the settings to save on a remote web server of the manufacturer of this software. This achieves a double effect. Firstly, space on the hard drive is not wasted, and secondly, remote servers, after all, have more high level protection than the home terminal. So, you don’t have to worry about the security of your saved data.

No less interesting feature iSpy is also the fact that such data can be viewed or sent from anywhere, provided you are connected to the Internet and confirm authorization. And finally, the most interesting thing. The security and tracking system is built in such a way that when intrusion into the territory is detected, the program automatically sends an SMS message to the user mobile phone, after which, directly from mobile device through the appropriate web server, access to view what the cameras recorded. In addition, you can even cancel any operation related to, say, locking doors or gates if a threat of intrusion is determined. This can happen, for example, if friends come to visit you and you are not at home. It’s clear that the system doesn’t care who came. If there is a setting to turn on the alarm, in general, all this can be turned off. And in general, in your absence you can carry out full control from anywhere and from any device connected to World Wide Web.

Finally, I would like to add a few words about system requirements required for iSpy. They are, by modern standards, quite modest: the operating room Windows system XP/Vista/7, Microsoft NET Framework (v3.5), Windows Media Player 9 VCM codecs (they are installed only if they are not present in the system), recommended processor frequency of 1 GHz plus an Internet connection.

Program interface: Russian

Platform:XP/7/Vista/8

Manufacturer: Developerinabox

Website: www.ispyconnect.com/

iSpy is a universal tracking system using multiple cameras and microphones. Moreover, the role of tracking elements is played by web cameras equipped with motion sensors, and their number, like microphones, is absolutely unlimited.

Main features of the iSpy program

The program allows, in addition to basic access to security cameras, to use many functions that are provided by a remote web server. The fact is that users are given the opportunity not only to monitor everything that is happening in the area in real time, but also to view previously recorded video. All working cameras produce direct recording, along with playback. So you can view previously recorded material. The recording format itself is automatically transformed into Flash format, which when installed player can be played even in a regular web browser. Recorded data can be easily saved to remote servers manufacturing company.

However, the capabilities of this software are not limited to this. The structure of the program is such that when connecting several users authorized in the system, it can transmit and receive data from computers connected to the Internet from anywhere and at any time. This principle is somewhat reminiscent of the use of so-called cloud technologies in terms of virtual file storages. This allows you to avoid many problems associated with both storing information and ensuring the security of stored data.

The capabilities of the software itself are quite large. The main advantage is the setting of sending SMS messages to the owner’s phone at certain intervals, as well as in the event of unauthorized entry into the entrusted territory. This can be quite convenient, say, in your absence when traveling on a business trip. Moreover, the program allows you to combine several computers into one group and gain full control over it using web management using remote access. In other words, any user of a computer connected to your network can track all movements of objects around the perimeter and places where surveillance cameras are installed.

If we talk about system requirements, then for normal operation this application you will need operating system Windows XP/Vista/7, Microsoft NET Framework(v3.5), Windows Media Player 9 VCM codecs (they are installed only if they are not present in the system), recommended processor frequency of 1 GHz and, of course, an Internet connection. By and large, the requirements are not that high.

So, in conclusion, it can be noted that protecting yourself from outside intrusion is quite simple. Trust it software, and you won't regret it.







2024 gtavrl.ru.