Skip to main content

Smart Voice Wireless GSM Home Security Burglar Alarm System SMS GPRS 433MHz US plug

GSM alarm system security

Description
1. Model: G65
2. Color: White
3. Input power: USB 5v
4. Standby current: <60mA
5. Alarm current: <300mA
6. Wireless frequency: 433 MHz
7. GSM format : support GSM 850 / 900 / 1800 / 1900 MHZ
8. Backup battery: 3.7V 800mA Li-battery
9. Battery standby time: 8h
10. Siren loudness: 80db
11. Wireless distance: 100 meters
12. Wireless defense zone: 1-94 zone
13. Wired defense zone: 95-98 zone
14. Emergency: 99 zone.
Gsm alarm system
Features
1. Easy to learn and use.
2. Host has 99 zones, wireless zone has 8 kinds of zone types for option and each zone can be individually switch alarm. The host has 4 wired zones. Each zone is set to normal and emergency zone and used separately (95-98).
3. Four groups of timing arming and disarming function,each group of timing arming and disarming can choose weeks,eliminating the need for frequent manual disarm , truly intelligent automatic control.
4. The host dials 8 groups of telephone numbers user set when alarm, power off does not lose the number
5. Seven seconds automatic message recording .and embedded artificial voice,the user can know where the alarm occurred and the area code at the remote answer alarm
6. Remote alarm and disarm, monitoring, propaganda, switch siren, switch intelligent socket function.
7. Wireless intelligent learning 1527 full range of accessories, can learn 99 remote control plus 99 detectors plus 4 wired zones (95-98)plus an emergency zone(99)
8. Telephone(cell phone) or SMS remote host system settings,innovative and compatible with international universal Mobile Fetion features to save the user to send text massages to the host system settings generated SMS costs
9. Can use the APP to set up the host and management ,support IOS/ Android operating system.
10. One line alarm linkage wireless intelligent switch ,1 line linkage wireless sound and light alarm.
11. Integrated high-precision clock chip,the time will not be lost due to power failure
12. Unique black box function,can display the latest 100 arm and disarm records and 100 recent alarm records.Accurate diaplay of the alarm time and zone number.
13. Two group center machine number,with a large central machine network, compatible with the international traffic alarm network Contact ID agreement.
14.With low power ,tamper function.
15.Built-in rechargeable high capacity lithium battery, power off automatic switching back-up power.
16.With function of power off settings.
17.The host adopts the quad-band GSM/GPRS module.
Package included


Package included
1 x Host
2 x Remote control
1 x Siren
1 x Infrared detector
1 x Door detector A(transmitter)
1 x Door detector B(magnet)
1 x Magnet
1 x USB cable
1 x Adapter(US/EU)
1 x User manual
Installation location
Speak loudly
Security freatures
Working after power off

Comments

  1. Hello, this weekend is fastidious for me, as this point
    in time i am reading this enormous informative piece of writing here at my home.

    ReplyDelete
  2. I pay ɑ quick visit daily some bloɡs and іnfοrmation sites to reɑd articles or reviews, but this blog provides qᥙality based
    writing.

    ReplyDelete

Post a Comment

Popular posts from this blog

Must Read This Before Renting

Please buy spy camera detector before renting any room or house. Please use it before going into any rented room or house.  Did I say please?
It's for your own good in privacy matters. You should read this recent article related to privacy issues.
Man arrested for allegedly filming tenants in bathroom with hidden camera A 38-year-old Jackson man spent the weekend in jail after police said they found a hidden camera in the bathroom of an apartment he manages.
"There were multiple videos of several different victims in a nude state,” said Jackson Police Lt. Roger Schultz.
The victims called police on Riley Sills after Sills sent them a picture of one of his tenants in the bathroom.
He threatened to send the photo to police, claiming he had caught one of them snorting drugs in his house.
Jackson police received a search warrant and found a hidden camera in the bathroom, disguised as a digital clock.
"The pin hole lens was almost invisible,” Schultz said. The camera mostly …

Tutorial How to Install IP Camera

Before you start installing your own IP camera, you need the right tools to do it. Another important thing you need to know is the location you want to put your IP camera. You may need  to buy some or all of the item in the list to install IP camera.
9 items to install IP Camera 1) IP Camera Of course you need IP camera to install IP camera.
2) RJ45 Cable You can use cable Cat 5 or Cat 5e or Cat 6.
3) Cable connector If you need to cut RJ45 cable, you need cable connector to connect it back with the cable.
4) EZ RJ45 Crimper You need this tool if you want to cut and connect the RJ45 cable.

5) Network LAN Hub Adapter If you have more than one IP camera, you shall use this to connect it to your computer.

6) Desktop computer
You need a desktop computer with internet connection so you can download the software to install IP camera.

7) Pencil Use it to mark on the wall, ceiling or any place you need to make hole on it.
8) Impact drill Be careful with this thing. Try to avoid using it unless you hav…

Identity Theft and Invasion of Privacy

What is spy? Spy is secretly obtaining information about certain individuals, groups, countries or any organization. Identity Theft or Invasion of Privacy? Spying could be both. Even stolen credit card information can be used to alter an individual's identity. Skip this part if you don't have a credit card.
How they steal your identity from your credit card? Firstly, they might use the credit card information to run up huge bills, forcing the credit card firms to suffer large losses or they might sell the information to other who is interested to do the same thing. Secondly, they might create new identities. For example, a criminal might contact the issuing bank of a stolen credit card and change the mailing address on the account.
Next, the criminal may get a passport or drivers license with his own picture but with the victim's name. With a driver's license, the criminal can easily acquire a new Social Security card. It is then possible to open bank accounts and rece…