DAHUA Devices and Home Automation

Domoticz, Home Assistant, Smartthings, Homeseer are just a few of the solutions used to automate a home. We’re working on fully integrating the DAHUA devices with these solutions.


So, what do you use? What would you like?



Don’t forget to check out our DAHUA<->MQTT broker/translator!

DAHUA gDMSS O iDMSS Para Windows

Are you looking for a iDMSS or gDMSS-like software for Windows? Our friends at https://www.preferredsolutions.us?offer a good alternative for it – named IPRVM, since no DMSS software has been written for Microsoft Windows. Continue reading DAHUA gDMSS O iDMSS Para Windows

DAHUA devices displaying “HACKED [x]” as Channel Name

DAHUA Recording Devices have been Hacked globally

It seems that many recording devices manufactured by DAHUA have been accessed and reconfigured, one way or another, by automated software developed by hackers. Usually, these are devices that are directly connected to the Internet and are accessed directly, not via a VPN or, maybe, a SSH tunnel (please contact us if you want to know how to secure your devices).
Devices affected include DVRs, HCVRs, NVRs, XVRs etc.
Continue reading DAHUA devices displaying “HACKED [x]” as Channel Name

Dahua timelapse instantáneas y gifs animados

Our brilliant Software Engineers have developed some applications that can be used to create timelapse snapshots for DAHUA devices:

  • Windows: a Windows-based application, that resides in the System Tray and captures snapshots at your defined rate
  • Linux: a Linux-server based application, without a GUI, that captures snapshots and, also, can make animated gifs (with the option to upload / synchronize them with a website); of course, if needed, we can also provide longer videos created from the snapshots
  • ARM/Embedded: an embedded device version that can be used with ARM-based embedded devices


Interested?


Give us a shout at [email protected] for more details!

DAHUA Dispositivos Usados Para Ataques DDoS

DAHUA Botnet
Parece que la vulnerabilidad que hemos estado investigando y parches (por lo menos, para nuestros clientes que tienen sus redes aseguradas) se ha utilizado para alimentar una BOTNET [roBOT + red] (o tal vez más) de dispositivos de CCTV. O, al menos, parte de él.

Hay informes entrantes de:
The Wall Street Jurnal
[email protected]
y otros también..

Aunque somos una empresa de partido 3, estamos interesados en ofrecer a nuestros usuarios con dispositivos de seguro o aumentar la seguridad de los dispositivos existentes. Ya hemos desarrollado un plan de copia de seguridad basado en VPN / basada en SSH para aquellos que utilizan estos sistemas, así que por favor no dude en contactar con nosotros


Para los afectados (víctimas) de este tipo de ataques, nos proporcionará, a petición, una solución que creemos que es cae en ‘activos cyber defense’ – un camino futuro para proteger a los consumidores y negocios online. También le animamos a contactar con nosotros para una breve discusión.


Este artículo se actualizará con noticias, como entrantes..