News:

Re-organized the forum to more cleanly delineate the development section, as the end user support side appears to have taken a life of its own!

Recent Posts

Pages: 1 ... 8 9 [10]
91
Hacking & Modding / GRAIN 8135S CPU SDK
« Last post by mircea on August 06, 2016, 09:19:51 am »
Hello, I've recently got a nice IP camera based on this chip: GRAIN 8135S.
As usually with these Chinese chips there is not much info much less a publicly available SDK even if this should be mandatory for the GPL part of the software (most of it).
I've seen that there available on the ftp server a SDK for an older version of this chip: GM8126 and I would like to get the one for the GM8135 but as usually even if Baidu finds the kit downloading it's impossible for a non-Chinese speaking person.

If some kind soul has this kit and wants to share please PM me, I can even compensate your efforts a bit.

 Thanks in advance, Mircea

92
Hacking & Modding / Compiling a simple "Hello world" C program for a hi3518 camera
« Last post by krokos on August 05, 2016, 02:49:33 pm »
Hi,

I have got my hands on a Yi home camera that is basically a hi3518 based camera. I have root terminal access to it via telnet and it is already running an FTP server among other stuff, so I can easily copy files over to it.

The first lines of dmesg are like this:

Quote
Linux version 3.0.8 (rock07@Server) (gcc version 4.4.1 (Hisilicon_v100(gcc4.4-290+uclibc_0.9.32.1+eabi+linuxpthread)) ) #1 Wed Apr 30 16:56:49 CST 2014
CPU: ARM926EJ-S [41069265] revision 5 (ARMv5TEJ), cr=00053177
CPU: VIVT data cache, VIVT instruction cache
Machine: hi3518

So, I want to cross compile a simple "Hello World" C program for it. I downloaded the hi3518 SDK (v. 1.0.7.0) and I can successfully run the compiler.

Quote
$ arm-hisiv100nptl-linux-gcc --version
arm-hisiv100nptl-linux-gcc (Hisilicon_v100(gcc4.4-290+uclibc_0.9.32.1+eabi+linuxpthread)) 4.4.1
Copyright (C) 2009 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

Then I wrote the simplest Hello World program I could think:
Code: [Select]
#include <stdio.h>

int main(void){
    printf("\n-----------\nHello, I am the Yi camera!\n-----------\n\n\r");
    return 0;
}

I am trying to compile it with the following command:
Quote
$ arm-hisiv100nptl-linux-gcc hello.c -o hello

I also tried to specify the architecture, with the same results:
Quote
arm-hisiv100nptl-linux-gcc -march=armv5 hello.c -o hello
And an executable called "hello" is created as expected.
As soon I transfer it over the camera and making it executable (just to be sure), I get an "Illegal instruction" thrown at me when I am trying to run it.
Quote
./hello
Illegal instruction

Any ideas on why this happens? It should be pretty much straight forward to run this. What am I doing wrong?
93
Created Version 5.

Download Link: http://107.170.59.150/V50/SecureImageDisplayV50.zip

Live Demos Using The Software: http://107.170.59.150

Enhancements:

1. Faster processing and less overhead.

2. Added digital zoom option.

3. Now supports Digest Authorization.

4. Images/Logos can now be embedded in the cameras image from a local file or from a website using HTTP and FTP.

5. When embedding images from weather sites. A delay can be used that stores the weather image in a local file and only gets a fresh copy when the weather website updates their image. Some weather websites update their weather images every 20 minutes. So this reduces logo/image processing and overhead. By storing the weather image locally and only making a remote request as needed.

Don

-Free IP Camera Software For Websites And Personal Use  -Live IP Camera Demos Using The Software  -About Me

 
94
General Discussion / Apexis APM-J011-WS and Nixzen NX-J011-WS supported?
« Last post by tkmbe on June 01, 2016, 07:53:11 am »
Hi all

While searching for new firmware for my apexis J011-WS cam I found this page.
I have not found thas this cam is supported. Can anyone tell my if this camera
is supported?

Model: APM-J011-WS
FW: 17.37.2.49
WebUI: 20.9.1.150

And has your fw https support? This is missing in my fw :-(

I have too Nixzen p2p cams:

Model: NX-J011-WS
FW:17.37.2.49
WebUI:20.8.1.137

Is this the same HW as apexis and fw will work too?

Thanks a lot for any information

Beat
95
Hacking & Modding / Re: Trying to gain access to a SIEPEM camera
« Last post by Cabeza_215 on May 26, 2016, 10:17:26 pm »
Hi, i have a SIEPEM camera, model S6213Y-WRA, it is very similar to ESCAM QF300. It had a bug with the audio and i installed a new firmware. Something went wrong and now it is bricked. I want to connect to serial port, but it is hard to know which connector it is in the PCB. Did u manage to gain access?
96
General Discussion / ONVIF Analytics
« Last post by sandcoffin on May 18, 2016, 07:26:49 am »
Hi openipcam community

I wanna ask for ONVIF Analytics, is it possible for a ONVIF camera to have two different instances of Modules or Rule of the same type (like tt:LineDetectorEngine) within one  video configuration token ?

Thank you very much
97
Hacking & Modding / SRICAM and firmware Wanscam
« Last post by millennium_y2k on May 09, 2016, 03:29:04 am »
Hello, I have a SRICAM sp015, and I found that does not have a web interface ...
Can I install the firmware of a WANSCAM identical ??
98
1. Video Operation
https://youtu.be/IjMHPyP_8Mg

2.Feature
*720P HD Resolution 1280x720P
*Mini Dome Network IP Camera
*3.6MM board lens for wide angle view
*In-Ceilling indoor&outdoor use
*IR LED day&night vision
*Use highly advanced image sensor
*Advanced H.264 video compression, achieving ultra low bit rate, superb high-definition picture quality.
*Support various information superimposed(such as DDNS etc.)
*Support dural-stream
-----
More dome ip camera feature please visit:
http://www.elpcctv.com/720p-hd-mini-dome-network-ip-camera-with-ir-daynight-p-50.html
99
Similar Hardware / Bricked ESCAM QF001. Support requested.
« Last post by YBarakov on May 05, 2016, 04:11:13 am »
Dear Forum,
In short: Bricked camera QF001 ESCAM, technician of the escam suggested to update the firmware, because pan tilt zoom functionality stopped working.
Update was unsuccessful, suggested to be done via web, I have read that is risky, unfortunately afterwards.
my request: Could someone is willing to share the steps for debricking the camera, please?
I have new firmware, with long name, which was rejected by the software, so I renamed it. Not sure whether the problem was caused by this issue.
The firmware is with .bin extention. Have a putty, and tftp applications. Have read threads for debricking of Dahua and Hikvision cameras, also in Russian forums, but so far nothing.
Currently, camera is connected via LAN cable and 2 leds are blinking. I tried to connect computer with lan cable to it, however did not manage to identify the IP address of the camera. Then, from the forum managed to read that default address is 192.168.1.10-Nothing again. Tried with cross over lan cable, and with normal one to ping this address, setting the computer ip address 192.168.1.7-nothing. Camera is not visible in LAN IP and ports snanning programs. The ultimate chance is to use jtag holes in the PCB of the camera. I have read some articles from this forum, but not sure how the things are in ESCAM cameras.
Can you share your experience with me?

100
Help / Re: newbie: help to access to a new cam ...
« Last post by nothinghood on April 29, 2016, 03:51:44 pm »
Hi,

long time lurker, first time poster :-).

I've 4 of these cams (damn), on eBay seems the cheapest (< 30$).

They have only port 23 open.

Two cameras have the same packaging but one (white model) have MAC starting 00:14 (S-TEC eletronics) the other (black model) MAC 00:15 (BETA tech).

Trying to connect MAC 00:14 the telnet promp looks like
Code: [Select]
root login:
Trying to connect MAC 00:15 the telnet promp looks like
Code: [Select]
(none) login:
The paper manual points to this site http://www.scc21.net/ for web access.

No luck login in through telnet using
root:root
admin:admin
root:admin
admin:root
admin:123456
root:123456

Update 2016-05-01
SoC is RT5350F

Now and then camera broadcasts (255.255.255.255 and 192.168.0.255) this to network
MainCmd=LocalData;bootproto=static;dns0=192.168.0.1;dns1=;netmask=255.255.255.0;netwet=192.168.0.1;userType=312;status=2;ver=820;index=0;lanport=5000;wannetable=0;errorcod=200;EnableSD=0;MoveRec=0;OutMoveRec=0;AutoRec=1;LoopWrite=1;Splite=50;AllSize=0;HaveUse=0;LeftSize=0;sdAudioMux=0;SDRecQC=1;devid=E150XXXXX;Psw=16216015546909088171

devid is the same printed on the side of the camera (obscured for privacy)

Psw is the same for all the 4 cameras I have.

Related to post
http://www.openipcam.com/forum/index.php?topic=760.0

Interesting post
http://jumpespjump.blogspot.it/2015/09/how-i-hacked-my-ip-camera-and-found.html

Another interesting post
http://jheyman.github.io/blog/pages/VideoSurveillance/
Pages: 1 ... 8 9 [10]