Home

Find`n`Secure Manual

image

Contents

1. 0 0 0000000000000000000000000000000000000000000 00000 PI O Introduction GPS tracking system The Global Positioning System GPS is a satellite based navigation system made up of a network of 24 satellites placed into orbit by the U S Department of Defense GPS was originally intended for military applications but in the 1980s the US government made the system available for civilian use free of cost Initially the highest quality signal was reserved for military use while the signal available for civilian use was intentionally degraded Selective Availability Selective Availability was ended in 2000 improving the precision of civilian GPS from about 100m to about 20m GPS works in any weather conditions anywhere in the world 24 hours a day GPS satellites circle the earth twice daily and transmit signal information GPS receivers use the information to calculate the user s location by the method of triangulation Basically the GPS receiver compares the time a signal was transmitted by a satellite with the time it was received The time difference tells the GPS receiver how far away the satellite is The receiver must lock on to the signal of at least three satellites to calculate a 2 D position the latitudinal and longitudinal position and track movement Using four or more Satellites the receiver can determine the user s 3 D position the latitude longitude and altitude Once the position has been determined the GP
2. As shown in the screenshot above you can select the report type from the dropdown combo box then select the tracker for which you need the report to be generated and lastly define the period for which you need the report Click over the Generate Report button to get the report Sample trip report In the screenshot below a sample trip report for a tracker is shown below which is self explanatory 100 Gs Find n Secure Name NLO2G 3240 Mobile 12345 Period Mon 03 Aug 2009 00 Starting Location Stopover Duration Travelling time Arrival time Distance Stopover Duration Period gt Reached Travelling time Arrival time D S 4 f Stopover Duration Pe riod Last Location Find n Secure Version 2 0 Instruction Manual Trip Report 3 Stopover feai 00 Tue 04 Aug 2009 00 00 00 0 04 KM from NH 34 Malda West Bengal India 0 01 KM from NH 34 Malda West Bengal India 14 Hours 38 Minutes Mon 03 Aug 2009 00 04 24 Mon 03 Aug 2009 14 42 59 0 05 KM from NH 34 West Bengal India 29 Minutes Mon 03 Aug 2009 15 12 08 12 93 Kms 0 05 KM from NH 34 West Bengal India 12 Minutes Mon 03 Aug 2009 15 12 08 Mon 03 Aug 2009 15 24 18 0 04 KM from NH 34 Sultanganj West Bengal India 22 Minutes Mon 03 Aug 2009 15 48 32 10 94 Kms 0 04 KM from NH 34 Sultanganj West Bengal India 1 Minutes Mon 03 Aug 2009 15 48 32 Mon 03 Aug 2009 15 49 46 0 04 KM from NH 34
3. SMTP Username alerts findnsecure SMTP Password alerts123 Group Individual Public V SSL Authentication Enabled Admin Email alerts findnsecure com Powered by Save Settings Map Settings Find n Secure Version 2 0 supports Google Maps and Microsoft Virtual Earth You may set default parameters that are loaded up whenever a user logs in the software The following table describes different options available Default Map Default service i e Google or Microsoft to use when user logs in the software Default Default center location for map service for Latitude Longitude example Latitude 47 600000 Longitude 122 330000 Whenever map is loaded on the browser window it 36 Find n Secure Version 2 0 Instruction Manual will automatically set the display center to this Latitude Longitude Zoom level Default Zoom level to which map service will be set is defined by this option Measurement System Default measurement system to be used in the software i e Kilometers or Miles Google Key Google Maps API key provided by Google for your domain Refresh Interval Servers constantly get packets from the tracking units This option controls how fast browsers shall fetch new locations from the server Your domain controller should create and forward a sub domain to your server IP address for example Domain Name www findnsecure com IP Address 67 222 62 165 New sub domai
4. a 2 1 6 30 E DAS wi el i 4 Y asT2 Control Center H YaST2 Network Adapter Setting up communication with the internet is the most important aspect of the Server setup In desktop or workstation environment you may opt to use 19 Chapter 2 Linux Configuration dynamic IP address scheme allotted by your DHCP server but for servers there has to be a static IP address to which your router forwards the incoming requests Setting up network adapter is an easy job if you have information about your network handy To setup network adapter open up Network Settings Click on Chameleon Icon Computer YaST gt Network Devices gt Network Settings m YaST2 Control Center opensuse32 File Edit Help Le Software Hardware Lasa System E Network Devices il Network Services Network Settings Global Options Overview Hostname DNS Routing Name v IP Address CG Novell AppArmor 790970 PCnet32 LANCE 192 168 1 55 y Security and Users dl Virtualization O Support XK Miscellaneous Search 79c970 PCnet32 LANCE MAC 00 0c 29 3b 5c 00 e Device Name eth0 e Started automatically at boot e IP address 192 168 1 55 24 reen Cancel Back ei 05 19 oe tz Following steps will help you configure network adapter for successful communication with internet gem r YaST2 Control Center YasT2 e Click Overview
5. if Sresult false dberror query error Srow mysql fetch assoc result 43 Chapter 3 Software Installation if row false if S row password GET pass print username associated is Srow username mysql free result result return 0 GE Final Steps Restart the server once you have successfully installed the software A nc Ka Manual Startu p linux gt cd root findnsecure linux gt sh start sh P gt Automati ic Startu ID In case you want to enable the software services automatically after server starts up please enable the findnsecure service from the System Services panel Click on Chameleon Icon Computer gt YaST gt System gt System Services 44 Find n Secure Version 2 0 Instruction Manual System Services Runlevel Details Simple Mode e Expert Mode Set default runlevel after booting to 5 Full multiuser with network and display manager v Running B 0 Description No DHCP Relay No Starts internet name service masq caching server DNS Yes Start the system logging daemons Quick X Display Manager Framebuffer setup Fetch mails for configured users findnsecure 0 5 start and stop Find n Secure virus scanner daemon Console mouse support haldaemon 2 HAL is a daemon for managing information about the hard icecream icecc inn Inter Net News Server INN i atta Jev ircomm to the IrDA port and SE Find n Secur
6. IMEl Number Contact Name Contact Mobile Remarks Speed Limit Alternate Email Chapter 4 Administration user logs in the software This field remains blank if the model you selected requires IMEI number If the model selected doesn t require IMEI this field is automatically filled by array of Us Name of the person who is associated with using this tracking unit Mobile number of the person who is associated with using this tracking unit Additional remarks field Here you may record any specific information related to the account tracking unit This parameter is relevant when you want the vehicle not to exceed a specific speed limit If the driver breaches the speed limit so fixed by you an alert will automatically be generated This field is used ONLY when hardware is not supporting over speeding alert system Generally most of the tracking unit now support over speed alert but models like FS 11 which doesn t have over speed alert system uses this parameter to identify over speeding Whenever any alert occurs over the tracking unit it is by default reported to the Group head but if you wish that the individual emails for specific trackers be also sent to some other person also you may write in the email address here to which alerts must be sent Once you have filled up the form click on Add Tracker to add tracking unit to the software After completing addition of the tracking units click on
7. tab e Select your Network adapter card e Click Edit e Select Statically assigned IP Address e Put the IP address subnet mask and hostname e Click Next e Click Hostname DNS tab 20 Find n Secure Version 2 0 Instruction Manual e Put your Name Servers DNS in the fields mostly your router IP e Click Routing tab e Put your default gateway address mostly your router IP e Click OK to save and activate your network settings Note If you are having trouble in finding out the Name servers address you can make use of OpenDNS service For more information please visit http www opendns com Once you have completed the network interface settings you may use Firefox web browser that comes pre installed in OpenSUSE to visit any website and check internet connectivity Apache HTTP We now proceed to HTTP Configuration Apache is an open source web server which is well known in the industry for its flexibility and performance As of March 2009 66 of the web servers on the internet were running Apache Microsoft accounts for 18 and 16 go to others You can see more detailed review at http news netcraft com archives web_server_survey html Now let us proceed with the configuration of Apache and make it operational Follow the following steps Click on Chameleon Icon Computer gt YaST Network Services gt HTTP Server HTTP Server Wizard will open up with Network Dev
8. 54 Find n Secure Version 2 0 Instruction Manual Done to complete the process of account creation The message Profile has been successfully created will then be flashed on the computer screen Once you have successfully created the profile the newly created user is automatically added to the Inactive users group Any user who has performed the login during last 30 days is termed as an active user whereas a user who has not performed any login in last 30 days is termed as an inactive user After creating a new user we now move ahead to modify user function The following operations are supported by the Modify User option for Group and Individual account types Operation Account Scope Location Add New Tracking Units Group Individual Modify User gt Add Trackers Remove Tracking Units Group Individual Modify User gt Modify Trackers gt Remove Tracker Update Tracking Units Group Individual Modify User gt Modify Tracker Modify Public Mapping Public Modify User gt Modify Public Mapping Modify User Profile Group Individual Modify User Public Customer Care Public Account is created just like the normal group or individual account but when you select public in account type all the fields are ghosted except account expiry username and password After you click on Proceed to next step all the trackers are shown under their respective usernames You can select the appropriate public mapping i e
9. 66 Find n Secure Version 2 0 Instruction Manual sera Panel SAFLIIC_DISPLAY_LANGUAGE j Curent led GET_SESSION_CHALLENGE BAGET_ NMEZONE INDEA SP UNC ACCOUNT EXPIRY BaF UHC _ COMPANY _LOCATION Remember setings on this computer How Taxi SF UNC_DRAWHAP_URL 4FUNC_INDV_ LARGE MAP URL SFUNC_HISTORY_ ENGINE LIRL MIFUNC_LOCATOR_ENGINE_URL SRFUHC_ LME EXTERNAL Destination Language ARABIC e SAGEGUAHAGE URL LE 24FUNC_REPORT_SCRIPT l o o SFUNC_ REPORTS URL A a Jr s Ei ERROR SORRY TEXT LOGIN_MAIN_TEXT LOGIN_EMAIL_ADDRESS LOGIN LANGUAGE LOGIM_REMEMBER Et A As you can see in the snapshot of the tool above it is pretty simple job to select the keys and then write down the new text required for display on the software screen Language tool is equipped with the automatic translation help in which text displayed in the Current Text box is automatically converted into the language selected in the Destination Language box and shown there under to help you in the translation You can save the translation you have done by clicking over Save to server You can edit the language as per your convenience and save it to the server and re login from the point you have last saved it Once you complete the work you can press Logout While performing edit operation you need to keep the following points in mind 1 All the keys starting with Sign are automatically disabled for editing as they should not be edit
10. 89 Chapter 6 Users Interface Geofence A Geofence is a virtual perimeter on a geographic area using location based service so that when the geofencing device enters or exits the defined area a notification is generated Geofencing is a critical element to telematics hardware and software It allows users of the system to draw zones around places of work customers sites and secure areas Geofencing notifies you when an electronically tracked asset in motion such as a person boat or a vehicle equipped with a vehicle tracking device crosses a virtual boundary The notification may be sent to a cell phone email Personal Digital Assistant PDA or Find n Secure tracking software It includes complete information such as the time date and location that the virtual boundary was crossed allowing for an immediate investigation or response to the situation The geofence may be used to monitor whether a tracked asset stays within the defined boundaries It may also warn of an asset s approach to a location in the case of reverse geofencing Geofencing uses a Global Positioning System GPS vehicle tracking or other equipment like personal trackers with GPS technology to compare the asset position to predefined virtual boundaries The geofence may be established as a simple shape such as a rectangle surrounding your yard or as large polygonal overlapping areas It may also define off limits destinations like an addr
11. Save button Drawing circular geofence Select Circular Geofence in the options panel and click over the map 94 Find n Secure Version 2 0 Instruction Manual Dragging the flag icon as in case of the track geofence shifts the circular geofence around the map for fine tuning In the options panel you may set the radius of the circular fence as per your requirements and the display is updated automatically to reflect the new geofence Once you have completed the drawing of the geofence simply put down the name of your fence in the space meant for and click Save button Load Geofence In order to have a look at the created geofence on the map select the Geofence from the Geofences list and click over Load button Alternatively double clicking over the fence automatically loads the fence on the map and draws it down Delete Geofence Select the Geofence from the Geofences list and click Delete button to remove the geofence from the server Removing the geofence automatically deactivates the named fence over all the selected trackers Geofence Management This utility allows you to activate and deactivate the geofences which you created using the Geofence drawing tool Activate Geofence When you open the Geofence Management tool by default you will see the Activate Fence option selected in the two tabs present as shown below in the screen shot 95 Chapter 6 Users Interface
12. 3 Now open etc sysconfig apache2 in your favorite text editor Kwrite Gedit etc and find the line probably line 14 APACHE_CONF_INCLUDE_FILES 4 Replace the found line with APACHE_CONF_INCLUDE_FILES etc apache2 httpd conf local Save the file and close it 5 Now create a new file etc apache2 httpd conf local in your favorite text editor and insert the text below SetOutputFilter DEFLATE SetEnvIfNoCase Request URI gif jpe g png no 9z1p dont vary SetEnvifNoCase Request URI A ta 71exe trgz ziplbz2 sitl rarl Tz swil pdt s no gz21p dont vary BrowserMatch Mozilla 4 gzip only text html BrowserMatch Mozilla 4 0 678 no gzip 29 Chapter 2 Linux Configuration BrowserMatch bMSIE no gzip gzip only text html Save the file and close it 6 etc init d apache2 restart Restarts the server for the changes to take effect Confirming it works Visit http www weboptimization com and use their analyze tool to find out that everything is working fine If your site is using mod_deflate the test will show you the following message Congratulations This site is using HTTP compression otherwise called content encoding using gzip The sizes reported here are for compressed content sent from the server to the client MySQL Updation MySQL is one of the most essential components for proper server functionality and therefore its constant up gradation and maintenance should be done You may frequently
13. Click on Chameleon Icon gt Computer gt YaST Security and Users gt Firewall fi Pa YaST2 Control Center opensuse32 File Edit Help YaST2 lt 2 gt 2 Eon Software JR Hardware Start Up Firewall Configuration Start Up Interfaces ES System Allowed Services Service Start E Network Devices Masquerading Broadcast _ Enable Firewall Automatic Starting il Network Services EI Novell AppArmor IPsec Support e Disable Firewall Automatic Starting Logging Level Custom Rules E Security and Users Switch On and Off dl Virtualization d Support X Miscellaneous Search Current Status Firewall is not running Start Firewall Now Stop Firewall Now Save Settings and Restart Firewall Now Cancel 16 18 TAS gel 4 YaST2 Control Cente y YaST2 18 Find n Secure Version 2 0 Instruction Manual Disabling Firewall Disabling involves two steps First you must disable the boot time Firewall startup This you can do by selecting the option Disable Firewall Automatic Starting And secondly you should stop the currently running firewall by clicking over Stop Firewall Now and finally click Next Enabling Ports in Firewall Linux To enable ports mentioned in the table given on the preceding page click on Allowed Services in the left pane and then select Advanced in the right pane In the TCP Ports f
14. Extract the contents of the file in the folder using the following command unrar x Installation rar Open the terminal window and execute the following command sh install sh Installation requires Find n Secure Username and Password which is provided along with the package Enter your Find n Secure Username Enter your Find n Secure Password Enter the password for root user of your MySQL server Installation will prompt you to remove the old database present in the system If you input yes then all your previous data is removed from the database Please note that you should take a backup of the old database if you are performing repair job Software installation is now complete To check the software installation open up Firefox browser and put the following address in the address bar of the browser window http 127 0 0 1 Find n Secure Version 2 0 Instruction Manual Member s Login Mozilla Firefox co x Eile Edit View History Bookmarks Jools Help a bg E Zei http 127 0 0 1 egi bin getpage php mode login Ms A8 P Most Visited Getting Started Latest Headlines Member s Login Find n Secure Before proceeding further you must login to the software as an administrator for performing some essential steps required for running the software correctly Default username for administrator login is admin and default password for the account is admin After the login
15. Sultanganj West Bengal India Account Modify Password You may modify your passwords for main account and associated public accounts through this utility The screenshot of the Account utility is shown below and various options available are described in the table there under 101 Chapter 6 Users Interface ee Cu kW f 7 H Account ix SH Current Password New Password Confirm New Password Please select the public account New password for the account Option Description Current Password Your valid password for login when you visit http track findnsecure com New Password New password which you wish to assign Confirm Password Repeat the new password which you wish to assign so that you don t make any typing error Save Save the main account password to the database server Public Accounts All the public accounts associated with your account are displayed down here and you may reset the password of these accounts by selecting the username and typing new password for the account Save Save public account password to the database server Back Return back to the main Advanced utilities window Directory Directory services offer you to create a database on the server with the information about your clients Directory is a very useful tool for dispatch system and it is integrated with the Locator tool to allow dispatch of the 102 Find n Secure Version 2 0 Instruction Manual vehicles a
16. User Settings Installation New Installation Installation Overview Perform Installation pm i e Update Configuration A e Automatic Configuration A O Repair installed System include Add On Products from Separate Media 3 Use Automatic Configuration Li Once you have clicked Next you will be presented with Desktop Selection Screen shown below You may install GNOME or KDE 4 1 or if you wish to use any other you may select from the Other option We would recommend you to proceed with KDE 4 1 which gives better control over Linux system and is more feature rich 12 Find n Secure Version 2 0 Instruction Manual AP D A AA stop Serechan ona you a Chee of nar meri The fad major dresstdeig DR ane IDE and AE Br inGcze de an trtoaAitgdeuioepew hnaha ge of potato including amid a Ale mand Sart Sei et HAU O A A E penan installation f a Gite DT ONCE 2 24 in putos from the E combenes Stat and mbr sth ratio J KDE 4 1 KS 4 1 4 he leteri Habis desks rete by ihe EDE Profe E din Ap rn hoghy urate dent op aeron k P GAU E o nd ee e Ss Ciber i LS E ECE Pop Beu FE ae E a Now YaST will setup your hard drive settings YaST automatically proposes hard drive partitioning and in case you wish to modify the partition you can click over Edit Partition Setup or if you want to create your own partition you can click on Create Partition Setup MySQ
17. ee Find n Secure Activate Fence Fence l cti E Ce Tracker Name Demo 1 Demo 2 Demo 3 PT Test FS 32 Select method Start Date End Date Fence Name Office home School Paliwal Park Lake Faridabad Palwal Kosi Mathura Sikandra NSEZ Minutes Minutes Copyright Embarc Information Technology Pvt Ltd Various Menu items of this utility are explained below Option Tracker Name Fence Name Select Method Description Contains the list of all the trackers active in your account Contains the list of all the geofences you have created using the Geofence tool Dropdown combo box has the following options Always Geofence is always on Period Geofence is activated only for the particular period you select e g 20 June 2009 From 6 00 AM to 10 00 AM Everyday Geofence is automatically turned on everyday for the selected period for example every day from 10 00 PM to 6 00 AM 96 Find n Secure Version 2 0 Instruction Manual Start Date Starting date of the geofence Hour 24 hours clock hour from which geofence shall start Minutes Minute in combination with Hour at which geofence shall start End Date The date on which the geofence will stop Hour 24 hours clock hour at which geofence shall end Minutes Minute in combination with Hour on which geofence shall come to a halt Activate Fence Activates the fence on the selected tracker You can activate mul
18. linking any tracker to a specified user account and press Select user mapping this will set the public 59 Chapter 4 Administration mapping to the respective tracker and when you login to this account it will show the selected tracker under public mode Version 2 0 SS Find n Secure IT EY EL Administrator Control Panel Modify Password Logout Public Users Mapping A Users Management Please select the public mapping from the list given below gt Database Management p Fe Backup Username Tracker Name Tracker ID Y 5 acecomm un a r Administrator Home _ acecomm John Soon 377762 Y Samitgoyal e Settings 1 amitgoyal Amit Goyal 544699 Y Banil anil Trident 207375 _Janil Anil Anand 611495 Y Bashish _J ashish Ashish Agarwal 487705 Y ES cyberpass _ cyberpass Geoffrey Farrugia 559586 Y E datec _ datec Navin Nand 844637 Y amp embarc Group Individual Public Select User Mapping Done Powered by Once you have done with the public mapping click over Done to complete the creating of the public account Device ID and IMEI Number In the previous section we have seen creation of basic accounts and adding tracking units Adding a new tracker to the software depends on the type of the hardware you have purchased and basic requirements of that tracker Some trackers are solely configured using the device ID such as FS 41 whereas some trackers are configured using their IMEI numbers
19. maintained in the server The format of the backup file is gzip compressed file which can be uncompressed by using gunzip command available on Linux systems Find n Secure PI EY EA Version 2 0 Administrator Control Panel Modify Password Logout Users Management Filename Date Stored Database Management _ backup_4dbd652e82e8b59ee38fbf8a sql gz Mon Jul 20 2009 10 24 15 PM Yes Backup Administrator Home Settings gt 0 e gt Group Individual Public Y Download backup file to this computer Powered by Y Store backup file over the server Perform Backup Restore We will now show you how to restore your file over the server in case of any mishap Login to the Linux system as root open the console and execute the following steps gt gunzip BACKUP FILENAME For example as shown in the screenshot above filename is backup_4dbd652e82e8b59ee38fbf8a sql gz 60 Find n Secure Version 2 0 Instruction Manual gt gunzip backup 4dbd652e82e8b59ee38fbf8a sql gz This will produce the file backup_4dbd652e8 2e8b59ee3 8fbf8a sql By default the name of the database used by the software is fnsv2 You are required to clear this database before you can perform restore gt mysql p fnsv2 PASSWOrA 6c 4444 mysql gt DROP DATABASE fnsv2 mysql gt CREATE DATABASE fnsv2 mysql gt exit gt mysql p fnsv2 lt backup 4dbd652e82e8b59ee38fbf8a sql Modify Password You can use this option to modify
20. you will see the following screen Administrator Control Panel Mozilla Firefox 2 e File Edit View History Bookmarks Tools Help X E Zei http track findnsecure com cgi bin getpage php mode admin V Ai y Ai A Most Visited gt Getting Started Latest Headlines Administrator Control Panel Find n Secure EMANIC Version 2 0 Administrator Control Panel Modify Password Administrative Tasks Logout Welcome to Administrator Control Panel Users Management Database Tracking Units Database Management Backup geen 2400 Administrator Home 2000 1600 Settings ERT TE 1200 Accounts EA Backup History Transferring data from track findnsecure com 35 Chapter 3 Software Installation Click on the Settings Tab in the left side list and the following screen will appear Un Find n Secure EMANE Version 2 0 Administrator Control Panel Modify Password Logout Settings Users Management Maps Settings Default Map Google X Database Management Default Latitude 27 17716 Decimal Form p Backup Default Longitude 78 00902 Decimal Form Zei Administrator Home Zoom Level 17 0 Minimum Measurement System Kilometer v Google Key ABQIAAAACtPcy6ruRZRQhQOt6ZaCuBSxp_VJ 0laVG6sdcggf1Wv5VAZl xQ Refresh Interval 5 Seconds SMTP Settings Mail SMTP Server smtp gmail com SMTP Port 465 wi Authenticate SMTP
21. 92 Find n Secure Version 2 0 Instruction Manual Longitude Longitude for custom navigation of the map Name Name that is assigned for drawn geofence Geofences List of geofences you have already created and saved on the server Delete Erase the selected geofence from the server Map navigation First step in drawing the geofence is to navigate to your desired location This can be done simply by putting down the Latitude and Longitude for your location and click on the Locate button Drawing track geofence Select Track Geofence in the options panel Drawing track geofence is as simple as clicking on the map Single click on the map places a new point over it You may continue clicking over the map to create a fence in the clockwise or counter clockwise direction as shown in the image below ror ES E SC o 93 Chapter 6 Users Interface You may also adjust the geofence by clicking and holding the left mouse button over the flag icon and dragging as shown below in the image a ee If for any reason you want to remove the point simply click over the flag icon of the point to be removed a popup window will appear as shown below Click Remove in the popup window SESION 59 E Cie tha be t Point Information E Latitude 33 97680 Longitude 81 01898 Remove Once you have completed the drawing of the geofence simply put down the name for your fence and click
22. Let us show you an example of a complicated history and a simplified version of it Check the screen shots below in the first screen shot history is for the complete day whereas the second screen shot shows the history between 7 00 PM to 8 00 P M 84 Find n Secure Version 2 0 Instruction Manual Co Find n Secure History Version 2 0 No of Locations Distance travelled 28 17 Kms Plotting Speed os i Seconds Animate Show Alerts Reload History PET LZ M CL Jm Ne LA HA A a AA rf eE GEI po A y Abe A SL SA Nagar N mi Raok E A N rt a A i ES a E JAJA y J e F Ramnagar Dee Ce Krishr Belanganj Ze Lal BL Gm EP Colon 2 Zeg A man LB e ma 2 e re z A Kasmiri Ca a FGokalpure fi tr Be n Find n Secure History Version 2 0 No of Locations Distance travelled 3 81 Kms Plotting Speed os ii Seconds Knimate Show Alerts Reload History M a hb r KSE STT Seo PR 3 Colony f 2 au Zei d JS ry Eze Suresh sare LS o ae w Kn BE k gt gt Rajuara Ed p Set be E j K SE SE E T fal Bail A AOS 7 ALL Nagar SE s NI NW T c 5 e ba lagre ki ec 7 5 A A Chauki Pr Krishna Sg raja ki mand station Moti Bi Chapter 6 Users Interface Thus you will find that in the complicated history Ge the first screen shot the path of the vehicle is densely populated by icons which render the analysis hazy whereas in the simplified vers
23. Nadu 10 47 52 PM India Lat Lng 13 1314 80 21454 Ah Get Location As you can see in the images above there are two tabs namely Details and Location Details show you the following properties Driver name Mobile number Speed Date Time amp Latitude Longitude while Location shows you the Geocoder functionality in which upon clicking Get Location 17 Chapter 6 Users Interface latitude longitude are automatically converted into human understandable textual representation like 2400 South 108th St Milwaukee WI 53227 Menu Bar Menu bar comprises of advanced utilities Google maps Microsoft Virtual Earth and Logout options Advanced utilities contain many useful tools that you can use for various purposes like Geo fencing Directory maintenance Locator etc Either Google Maps or Microsoft Virtual Earth may be selected as your mapping engine and Logout take you out of the software Activating Individual Mode Clicking over any of the trackers present in the trackers list activates individual mode Individual mode is the complete analysis of the particular tracker in real time When you click on any of the tracker the right pane of the browser window is loaded with the individual mode as shown below Find n Secure Version 2 0 a Advanced Utilities CG Google Maps M Microsoft Virtual Earth Logout Kei EH E ae lap Satelite Hybrid gt sj Se Name Iklakh Ahmed Mobile 9760
24. Optimizer Busr 10ca1 Zend lt Eancel gt as Ml Shell 3 You need to provide the correct path for your php ini file On OpenSUSE this file is present in etc php5 apache2 Shell Konsole Session Edit View Bookmarks Settings Help zend Optimizer Installation end Optimizer 3 3 0a Confirm the location of your php ini file ete phps apachezW lt Eancel gt as MN Shell 4 Press Yes when installation prompts the message Are you using Apache Web Server 32 Find n Secure Version 2 0 Instruction Manual 5 Use the provided default path for Apache control utility and press OK 6 Once installation is complete it will ask you whether it should restart the Apache web server or not You need to restart the Apache web server so press OK You have now successfully installed Zend optimizer over your Linux server and your server is now completely ready for software installation In the next chapter we take you through the steps of software installation 33 CHAPTER 3 Software Installation Since you have installed and configured Linux we now take you through the steps required for software installation It is pretty straight forward to install the software and prepare it for execution The following steps will guide you to perform software installation 1 CON OD UI Copy the provided software installation file in the folder root Installation
25. be aware of the firewall system on your network before making the connection to MySQL Port number 3306 is default port for communication with MySQL and therefore your firewall should allow communication on this port Once you have performed the above steps your MySQL is ready to connect via any PC using MySQL administrator Open the MySQL administrator utility on your computer and fill up the following fields Find n Secure Version 2 0 Instruction Manual e Server Host IP address or hostname of the server on which MySQL is running e Username user e Password password e Click on OK Your MySQL administrator will be connected to the MySQL database engine You can go through the wide range of documentation available for this utility to become friendly with this utility Some of the tasks that you can do using this utility are e Backup You can schedule backup projects e Restore e Database maintenance e Server health monitoring e Server logs e Replication Status tcpdump The most common source of problems with the tracking units is the incorrect configuration of the tracking units for communication over GPRS This utility can help you identify if the tracking units are communicating well with the server or not Find n Secure software opens up port number 21000 by default for communication over UDP and TCP IP Given below are some of the useful commands and their respective meanings gt tcpdump port
26. button enables you mark the destination over the map for which you wish to know the ETA After selecting your destination you should click on this button to start the software for computation of estimated time of arrival If you wish your server to learn a route for this tracker you should click on this button and once tracker has reached the destination click it again to stop route learning and save it to server Analysis of the speed variation happening at various time intervals during journey is shown in a graphical representation This is a very helpful graph to analyze the driving pattern of your driver and his braking habits 83 Chapter 6 Users Interface History This panel gives you convenient options to view the history of your tracking unit and if your hardware supports output commands then you can control the unit from your desktop or laptop itself e g by blocking the engine locking the door or blowing the horn to attract public attention in case of theft etc EN Force Location Update Start time Send via GPRS End time pz AM PM B Send via SMS Quick combo box templates allow you to see the history of the tracker quickly with the options of Today Yesterday or Custom Sometimes history of a particular tracker is quite complicated and understanding it may be a daunting task In such cases we provide a filter which enables you to make the selection of the time for which you wish to see the history
27. commands to the tracking unit for various operations like blocking the engine or cutting fuel supply to engine etc GPS personal tracking system is commonly used for tracking of persons pets etc You can keep track of your loved ones in real time using a completely accurate and totally reliable GPS software package via the internet so you know exactly where your kids parents pets asset are at any given point in time Find n Secure9 Embarc Information Technology Pvt Ltd a leading provider of GPS tracking and security system from India aims at offering innovative and cost effective tracking and security solutions comprising of hardware as well as software GPS tracking technology is best suited for fleet management It is a unique way for companies and individuals to monitor and control their cars jeeps trucks and other vehicles to their precise details by sitting in the office Find n Secure GPS tracking system will enable you to monitor the movements of your employees drivers vehicles or any other asset accurately With Find n Secure vehicle tracking system in your company s fleet of vehicles you will find a smart way of fleet management by tracking your vehicles Whether you own one truck or a fleet of thousands of vehicles our highly skilled GPS fleet consultants will assist you in selecting the right type of vehicle tracking system that will give an edge to your company CHAPTER Linux Installation Welcome
28. day to day scenarios are explained below to understand this utility Scenario The vehicle of your customer has been stolen and he doesn t have internet accessibility He rings you up for help and wants that the engine of his vehicle be blocked and reported to police Your Customer Care Centre executive may enter into the customer s account without asking him the username and password by simply clicking on his name in the list appearing in the screenshot shown above and after verifying his credentials may carry out the activity of tracing the vehicle blocking the engine and informing the police 107 Chapter 6 Users Interface IND Scenario One of your customers has forgotten the location of his car parked by him in the market He rings you up to help him in locating the car by blowing its horn Your customer care executive may enter into his account by clicking on the customer s name and then carry out the activity of blow horn after verifying his credentials Alerts on Mobile Whenever alerts are generated they are delivered to the group head on his email address The group head can choose to have the alerts forwarded to his mobile phone too There are many ways to do this One of them is to use push email wherein email received on the specified email address is automatically pushed to the mobile phone of the user GMAIL is now providing free IMAP and Push email service to its users More information on configur
29. on which all the important notifications from the software are required to be transferred Understanding Configuration File config sys Server administrators may need to fine tune the system or change certain parameters as per server hardware or network connectivity In this section we will have a look at the config sys file which allows you to perform these operations Lines starting with sign are comments and you should be very careful in editing config sys file as even a small error might lead to complete service halt Property Value UDPServerName Hosting IP address of the UDP service If you have multiple interfaces installed over the server than you might need to select the interface on which UDP service will be hosted The default value of this property is 0 0 0 0 which means UDP service will be started on all the interfaces UDPServerPort UDP port number on which service is to be hosted By default 21000 is used by the software and this port is required to be forwarded by your router firewall to this server All the communication via tracking unit is performed through this port when UDP protocol is working in the tracking unit 38 Find n Secure Version 2 0 Instruction Manual TCPServerName FilterlP FilterPort UDPSendIP UDPSendPort UDPforTCP_OPSServerName UDPforTCP_OPSServerPort UDPPacketSize FilterPacketSize ServerReceiveBuf
30. server MySQL has an in built ability to replicate the data on one or more storage servers In this section we will show you how to create a mirror for your MySQL service You need one additional server installed with the same version of the MySQL to avoid any problems let us denote your primary server with name MAIN and your secondary server with name MIRROR Settings for MAIN 1 Create User in MySQL mysql gt mysql p Enter your password mysql gt GRANT REPLICATION SLAVE ON TO repl S mydomain com IDENTIFIED BY password 2 Open my cnf navigate to section mysqld and add the following lines log bin mysql bin 68 Find n Secure Version 2 0 Instruction Manual server id 12345 Issue the following commands in MySQL mysql gt FLUSH TABLE WITH READ LOCK mysql gt SHOW MASTER STATUS Record down File and Position and quit mysql On the Linux shell prompt issue the following command Shell gt mysqldump all databases master data gt dbback sql Re enter MySQL and issue following commands mysql gt UNLOCK TABLES Once you have completed the above steps your primary server is ready to allow secondary server for fetching data Steps for MIRROR 1 Copy dbback sql file created over the MAIN server and move it to MIRROR server Thereafter issue the following command to create a copy of the database on the MIRROR server Shell gt mysql p lt dbback
31. sql Open my cnf navigate to section mysqld and add the following lines server id 67890 this ID should not match master 69 Chapter 5 Advanced Tools for Administrators 3 Issue the following command in MySQL prompt mysql gt CHANGE MASTER TO MASTER HOST MASTER HOSTNAME OR IP ADDRESS MASTER USER USERNAME repl as created above MASTER PASSWORD PASSWORD password as created above MASTER LOG FILE LOG FILENAME as you recorded above MASTER LOG POS LOG POSITION as you recorded above mysql gt START SALVE All the steps required for slave setup are now complete and data replication should start as per the requirement In case you face any sort of issue you may checkout the log files situated at the locations var lib mysal 70 CHAPTER 6 Users Interface Welcome to the Find n Secure users interface In this section we will cover the basic and advanced operations of the software available to the users group individual public customer care Software is compatible with the following browsers e Internet Explorer 8 0 e Firefox 2 5 e Google Chrome 2 0 e Apple Safari 3 0 It is always a best choice to keep your browsers updated to the latest build as these are free to download and provide various new features and prior bug fix Most of these browsers are compatible with old or new Windows Macintosh or Linux platforms In addition to the b
32. the password of administrator account It is important to keep a strong password for your administrator account as the complete functioning of the software may be hampered if this is leaked out Settings Please refer to Chapter 3 Installation for options related to Settings 61 CHAPTER 5 Advanced Tools for Administrators In the previous Chapter we visited options available to administrators via software interface to perform administrative operations but sometimes it becomes important for administrators to make use of Linux tools for debugging software issues We will go through the series of such tools in this Chapter starting with MySQL administrator Utility MySQL Administrator Utility You can download and install MySQL administrator utility from the MySQL website http www mysql com and moving to the section Downloads gt GUI Tools Once you complete download and installation you are required to perform following operations on the Linux server e Login as root user in the Linux system e Open console e Execute mysql p fnsv2 e Enter your MySQL root user password e Execute mysql gt GRANT ALL ON TO user 192 168 1 10 IDENTIFIED BY password This command will allow user with username as user to login from host IP address 192 168 1 10 and the password provided is password You can modify this command as per your requirements For more understanding please refer to MySQL manual Please
33. this directory is var lib mysql or my cnf to set user specific options it In this file you can use all long options that a program Supports If you want to know which options a program supports run the program with the help option The following options will be passed to all MySQL clients client password your password port 3306 socket var lib mysql mysql sock Here follows entries for some specific programs The MySQL server mysqld port 3306 24 Find n Secure Version 2 0 Instruction Manual socket var l1lib mysql mysql sock skip locking key buffer 384M max allowed packet 1M table cache O12 Sore Dutter Size 24M reade DUITS size 2M tead rnd burter size M my sam Sort butter size GAM thread cache size 8 query cache Size 452M 7 Ley number or CPU s 2 for thread concurrency thread Concurrency lt 6 Don t listen on a TCP IP port at all This can be a security enhancement if all processes that need to connect to mysqld run on the same host All interaction with mysqld must be made via Unix sockets or named pipes Note that using this option without enabling named pipes on Windows via the enable named pipe option will render mysqld useless it fskip networking Disable Federated by default skip federated Replication Master Server default binary logging is required for replication log bin mysql bi
34. untouched commented and instead use CHANGE MASTER TO see above required unique id between 2 and 2 32 1 and different from the master defaults to 2 TE master host ls set 26 Find n Secure Version 2 0 Instruction Manual Dut will mot function as a slave If omitted server id A it The replication master for this slave required tmaster host lt hostname gt it The username the slave will use for authentication when connecting to the master required master user lt username gt it The password the slave will authenticate with when connecting to the master required master password lt password gt The port the master is listening on optional defaults to 3306 master port lt port gt it binary logging not required for slaves but recommended tlog bin mysql bin it binary logging format mixed recommended binlog format mixed Point the following paths to different dedicated disks tmpdir EMO tlog update path to dedicated directory hostname Uncomment the following if you are using InnoDB tables innodb data home dir var lib mysql tinnodb data file path ibdatal 2000M ibdata2 10M autoextend innodb log group home dir var lib mysql 7 You Can set 4 buffer pool size up to 50 80 3 of RAM but beware of setting memory usage too high innodb buffer pool size 384M innodb additional mem pool size 20M t Set lo
35. 020592 Speed 21 km hr Date Thu 6 Aug 2009 Time 10 55 26 PM Lat Lng 13 15675 80 20456 Profile d OSL Logistics Pvt Ltd Gurgaon India No of tracking units 10 Account Expiry 16 07 2010 a Pll ini Trackers List Kl e Ri Icon Name Status tee A mbatur A J Ss High Rd SP ou kat St nda Ei NLO2G 3240 El Stopped EJ NLO2G 0997 EA Moving NLO2G 4071 a Stopped NLO2G 4063 Stopped NLO2G 2594 Idle MEF Kadirvedu NLO2G 3223 Moving mn NLO2G 3202 Stopped 4000 ft at e Mig e OG A 500 m Imagery Q 5009 Bro ba hie es Spot Image Map KIT A Report Sensors Alerts Distance vs Time ETA Spee History amp Contro NLO2G 2557 Stopped NLO1D 6262 Moving NLO2G 3233 Stopped Distance 0 87 Kms Avg Speed 26 41 km hr Max Speed 40 95 km hr Last Update Thu Aug 6 22 55 26 2009 Packets Powered by Find n Secure 8 8 Place 0 03 Kms from National Highway 5 Mettuppalaiyam Pozhal Tamil Nadu India 78 Find n Secure Version 2 0 Instruction Manual As you can see in the screenshot above complete real time analysis and control of the tracking unit is available through various tab windows Tabs are divided into the following sections Option Report Sensors Alerts Distance vs Time ETA Speed History and Controls Report Tab Report Sensors Distance 0 87 Kms 26 41 km hr 40 95 km hr Last Update Thu Aug 6 22 55 26 2009 gt 4 5 E Description Detailed description o
36. 21000 Capture all the packets coming in and going out of the server related to UDP and TCP IP port number 21000 gt tcpdump udp port 21000 Capture all the packets coming in and going out of the server related to only UDP Protocol port number 21000 63 Chapter 5 Advanced Tools for Administrators gt tcpdump tcp port 21000 Capture all the packets coming in and going out of the server related to only TCP IP Protocol port number 21000 gt tcpdump udp port 21000 and host 192 168 1 10 Capture all the packets coming in and going out of the server related to only UDP Protocol port number 21000 with the host having IP address of 192 168 1 10 gt tcpdump udp port 21000 and dst host 192 168 1 10 Same as previous command with the only difference to capture packets having destination host as 192 168 1 10 gt tcpdump udp port 21000 and src host 192 168 1 10 Same as previous command with the only difference to capture packets having source host as 192 168 1 10 Wireshark Wireshark is a kernel level network packet capture utility You can see it as a GUI tool with capabilities of tcpdump utility discussed in the previous section Wireshark package is present in OpenSUSE distribution by default Click on Chameleon Icon Applications System Network gt Network Analyzer Wireshark You can go through the huge collection of documents available on the net for learning basic features of wireshark and also get the documentation fro
37. 52 37 AM 27 20202 78 02213 _ Sun Jul 5 2009 05 54 48 AM 27 20202 78 02213 _ Sun Jul 5 2009 05 56 59 AM 27 20202 78 02213 _ Sun Jul 5 2009 05 59 08 AM 27 20202 78 02213 3 Sun Jul 5 2009 06 01 19 AM 27 20202 78 02213 _ Sun Jul 5 2009 06 03 30 AM 27 20202 78 02213 _ Sun Jul 5 2009 06 05 42 AM 27 20202 78 02213 _ Sun Jul 5 2009 06 07 54 AM 27 20202 78 02213 3 Sun Jul 5 2009 06 10 05 AM 27 20202 78 02213 O R I O ta O OS O ta O AUS O ER O EE O NEI O MA YO pc E cc Sun Jul 5 2009 06 12 14 AM 27 20202 78 02213 Delete Record J Powered by Backup As the name of the utility suggests it is used for taking the backup of your server system It is very important for you to keep regular backup of your server system so that in case of any hardware failure or mishap you have the restore point to fall back upon We have two options available in the software for backup 1 Download backup file to this computer 2 Store backup file over the server It is always advisable to download the file on your personal computer and move the file to any archiving facility like DVD pen drive etc Storing backup file over the server can be useful in the eventuality of your system developing some kind of a database corruption which needs to be restored immediately 59 Chapter 4 Administration from the stored backup file You can see in the screenshot below backup filenames are generated automatically using random digits and a log is
38. L disabled Virtual Hosts linux p3sr in srv www htdocs SSL disabled HTTP Server Expert Configuration Help Cancel Back Finish e LD el JU win ZA YaST2 Control Center linux p3sr YasT2 a 1 12 31 i A ad e GL Leslie Now let us check the working of the Apache server Open the Firefox browser and perform the following activities Click on Chameleon Icon gt Favorites gt Web Browser In the address bar type http 127 0 0 1 and it will show up It Works MySQL MySQL is a Relational Database Management System RDBMS and is one of the most important components All the data arriving from all the tracking units is broken down analyzed and stored in database as history component from where various types of reports and all previous visited locations and other 22 Find n Secure Version 2 0 Instruction Manual information is primarily acquired Setting up MySQL is simple and involves only few steps Let us now proceed to its setup Click on Chameleon Icon Computer gt YaST gt System gt System Services Scroll down to MySQL service and click Enable Now MySQL service has started up but we need to do some more basic configuration Open Terminal from Favorites and issue the following command mysqladmin u root password lt root password gt example mysqladmin u root password findnsecure The above command will set the password for root access To check that everythi
39. L is the most hard drive space utilizing component in Find n Secure So we propose you to have maximum space in your var mount point This allocates enough room for MySQL server to keep data record of your tracking units and accounts created via web interface You may click on Edit Partition Setup select partition and adjust their sizes as shown in the screenshot given below Once you are done with the partition click Accept and then Next 13 Chapter 1 Linux Installation openSUSE 11 1 thee a Expert Partitioner System View Partition dev sdal Preparation chu f E li Cr Le linux LE Hard Disks Device E E e Device dev sdal pes mi Size 494 19 MB Desktop Selection Device Path pci 0000 00 10 0 scsi 0 0 0 0 partl es Device ID 1 Used By User Settings as es FS Id 0x82 Linux swap Disk Installation Crypt Files Device Masp File System Installation Overview e File System Swap Perform Installation F NFS Mount Point swap U d Devid Mount By Kernel Configuration el Gemeis es UUID Label Automatic Configuration s Encrypted No Resize Delete Abort Back Accept After completion of hard drive partition setup you come to Create New User screen You need to create a user account over here which will be used by you other than as a root user which by default is for system administrator It is recommended
40. O2G 3240 877 02 Kms NLO2G 2594 935 79 Kms NLO2G 2557 1003 42 Kms NLO2G 4063 1012 24 Kms NLO2G 3223 1152 33 Kms arastra NLO2G 0997 1471 32 Kms A z fo Pune ALS Mumbai A Hyderabad my e O CAREER Coimbatore Tamil Nadu O OO Emakulam Jaffna Kerala Powered by Find n Secure Location update Seconds Skype browser integration for easy calling wi ZS ay x S e Pradesh amp 7 n f 4 Chhattisgarh 07 Loa oe frequency of the locator is Locator ER E SE EA P Et ER AAA GER Er S Kathmandu Ee Kei rd S A Pradesh i Metropolitan Citys A we gt MAR Sikkim Bhutan yn E natal y A A Bangladeshf fF Jharkhand ES EIS CR Bengal Dhaka WITZ Kolkata si Panikoill Tripura Li Orissa Natara Sittwe Mizoram Bra ajahmundey Fatze m z Visakapainam Mullaitivu Maradankadawala Kinniya kd 200 mi fl Oogie 500 km Imagery 82009 S lanb Map data 2009 NFGIS AND Europa Technologies Terms of Use 10 Skype is one of the most popular VolP solutions present around globe which also allows calling on the mobile phones with economy You may install the Skype extension for your favorite browser such as Firefox or Internet Explorer and all the mobile numbers displayed in the tabs of our live module automatically convert into Skype recognized mobile calling numbers which you simply click to call or to send SMS
41. RESTO di 60 Modi y PASS ee asas A A a 61 SEHR OS RO 61 Advanced Tools for Administrators ccccenccccccccecsccccccccccccceecscees 62 MYSQL Administrator UU aaa cand EEA 62 ene e Te aca 63 HE 64 Capturing with tcpdump for viewing with Wireshark sccceecceeeeceees 65 Bt Conversion Kee EE 66 EES Up MYSOL MITO vts aa 68 Setuanas TOF MAIN sra is Wis eiacaW eed deed ese aaa a aeia 68 SEEDS TON MIRROR EE 69 Users Mtei EE E ee 71 User Promesa ts 73 Tracker til tias 73 Tracking MAD E 76 NU NEE 78 Activating Individual MOG cocina ii de 78 REDOT Taba iii li 79 SEMSOMS TDi iii 80 Alerts Tab 81 Distance ys TIME E e EE 82 Expected Time of Arrival ETA AA 82 PELA FAP As 83 leie EE 84 ed aneii aE E EEE eed iaca nace wench ot iasuueiaad 86 Advanced Utilities TO EE 87 Locator Locating nearestirackern ia ies 88 EE APP RO S O O ui ase eis eed era os ele aloes eae 90 Geofence Visual drawing tool cccccecccccscccecccccccceescecccccesseeesceees 91 MAD NaVIG aci lid 93 Drawing track SEOTENCE iii ses ders E 93 Drawing aile ET ti Le E 94 Load Keele EE 95 Delete Geo tencia dao 95 Geofence Management ENEE 95 Activate GOES aia casa 95 Deactivate Geof ENCE cima A A AAA 97 Die 98 Account Modify PasSword ccsccccscccescccecccecsccesscceeccssscccesscees 101 PO ee 102 Mita iia 104 Forgot Username Password ENEE 105 Public User Interface Customer Care User Interface Alerts on Mobile
42. S unit can calculate other information such as speed track trip distance bearing and more GPS Tracking Unit A GPS tracking unit is a device that uses the Global Positioning System to determine the precise location of a vehicle person or any other asset to which it is attached and to record the position of the asset at regular intervals The recorded location data can be stored within the tracking unit or it may be transmitted to a central location data base or internet connected computer using a cellular GSM CDMA radio or satellite modem embedded in the unit This allows the asset s location to be displayed against a map backdrop either in real time or when analyzing the track later using customized software Common uses Most common application of GPS tracking system is applied for tracking of moving objects such as vehicles Vehicle tracking systems are commonly used by fleet operators for fleet management functions such as routing dispatch on board information and security Other applications include monitoring driving behavior such as an employer of an employee or a parent with a teen driver Vehicle tracking systems are also popular in consumer vehicles as a theft prevention and retrieval device Police can simply see the vehicle in real time over the tracking system and locate the stolen vehicle Remote controlling of the vehicle through GPS tracking system is also possible In such a case owner of the vehicle can give
43. SL Logistics Pvt Ltd 3 yl a Se da bg Or ST Zog et A 3 7 ESA d Huhehaote Profile y Gurgaon India t seet i z AE RE A KC i Uzbekistan a O 5 d ei d Zi 3 AS bat Sex awe e d e e D gt e x No of tracking units 10 JE C GT e en S SCH S zt r x i as rg Yinchuan Zerd Mota pco Dushanbe Sa s 4 E AA e KERI oxi RO A e ikistan K y RK 4 A AA a en Ay E SE 5h t S KC z ES a z 3 i Bee Shijiazt Account Expiry 16 07 2010 Ai r MOTERA lee H ke A SEA Sub TO Trackers List ChE i Zhengzt yn Icon al el 9 9 el Name NLO2G 3240 NLO2G 0997 NLO2G 4071 NLO2G 4063 NLO2G 2594 NLO2G 3223 Status El Stopped E Moving ER Stopped Stopped E Moving Moving India AER EF Zelt China ST Burma abroom t Myanmar ansa A Chongqing E e a A Es Guiyang IC Nanning ks SS ang Son Wh Ri J Changsh G ange h PA NLO2G 3202 d Stopped NLO2G 2557 Stopped NLO1D 6262 Moving NLO2G 3233 Stopped l A WEE ETE Medan EAG y kd NV We J Singapore Powered by Find n Secure 500 mi ei i m geh 20 Tettaketrics Map dala 2009 NFGIS Tele Atlas AND LeadDog Consulting MapIT Europa Technologies Terms of Use User Profile User profile displays your company name address and logo registered with Find n Secure It also displays the number
44. ade Images fetched live from the camera and shown next to the temperature component and keeps on changing depending upon the hardware settings These features are available only in the specific models of the hardware Find n Secure Version 2 0 Instruction Manual Alerts Tab This shows all the events and alerts happening on the unit Left side of the table shows date and time while right side displays the event occurring on the tracker Distence vs Time ETA Speed History 8 Controls Date Time Fri Aug Y 07 10 46 2009 Force Location Update Fri Aug 7 07 10 50 2009 Blow Horns Fri Aug 7 07 10 53 2009 Stop Horns Fri Aug 7 07 11 01 2009 Doors Unlocked Fri Aug 7 07 11 05 2009 Doors Locked Whenever any event occurs on the tracking unit it is notified to the user by the following four methods 1 Audible notification on the client computer 2 Listing in the Alerts tab 3 Email sent to the group head or an individual Trackers List Icon Name Status A NLO2G 3240 CI 6 nNLo2G 4071 NLO2G 4063 E NLO2G 2594 NLO2G 3223 D NLO2G 3202 OFF NLO2G 2557 Stopped NLO1D 6262 Moving NLO2G 32 a Stopped 81 Chapter 6 Users Interface 4 Tracker bar turns red for the particular tracker as shown in the image above Real time analysis of distance versus time is performed over the client end and is plotted in the format of graph as shown below Report Sensors Alerts Distance
45. amp cyberpass Database Query Warning Performing operation on database can lead to unrecoverable loss of information please use it with caution Please select the date 07 20 2009 sil Please select the scope to apply on date Only on date Individual Public Please select the operation to perform over Browse v Perform Powered by As shown is the screenshot above you have trackers list along with their usernames You can select the trackers from the list and then perform various operations on the trackers like Browse Clean Tables amp Clean Database You can see a warning note posted which says this operation can cause irrecoverable data loss It is always wise to take the backup of the database before performing any operations on the database We will show you in the 57 Chapter 4 Administration next section as to how you can take the backup using the software and also by using the MySQL graphical user interface utility Database management works over raw data which is stored in the database using the Greenwich Mean Time Let us demonstrate this with the help of an example As shown in the illustration below all the tracking units send GPS data via GPRS CDMA Satellite to the base server which is your service hosting server infrastructure On your server this data is stored in the raw GMT format i e no time zone information is recorded in this data Whenever you fetch data from the software it auto
46. data 2009 Tele Atlas Terms of Use Pius ge Stockholmer Ales ema hi Bonet J BE Ey B d mr L Pr F j y e b LS wi 7 ts Distance vs Time 212 Speed y 1 21 Kms 0 00 km hr 33 81 km hr Fri Aug 7 08 16 40 2009 Packets Place 0 01 Kms from Weltausstellungsallee 30539 Hanover Germany Customer Care User Interface Your customer care center can be a vital utility in providing fast after sales service to your clients Keeping this in mind Find n Secure software provides customer care accounts described in the administration section When you login as a customer care executive you have the complete list of the client accounts Group Individuals accessible to you You may select the account to whom you wish to provide the service and login to his account 106 Find n Secure Version 2 0 Instruction Manual without the need of asking your client about his username or password The screenshot below shows you the customer care login screen Find n Secure Version 2 0 Select Group or Individual Account ashish Group jaintours Jain Tour amp Travels Group vinayak Shree Vinayak Fleet Services Group vibhubenara Benara Udyog Group acecomm AceComm Technology Services Group sanjaybansal Prem Ford Group amitgoyal Amit Goyal Associates Group shielventures Shiel Ventures Group osil OSL Logistics Pvt Ltd Group d Copyright Embarc Information Technology Pwt Ltd Some
47. e and do not want the network load associated with running Wireshark remotely not to mention all the X traffic polluting your capture However the default tcpdump parameters result in a capture file where each packet is truncated because tcpdump by default only captures the first 68 bytes of each packet To ensure that you capture complete packets use the following command tcpdump i lt interface gt s 1500 w lt some file gt 65 Chapter 5 Advanced Tools for Administrators You will have to specify the correct interface and the name of a file to save into In addition you will have to terminate the capture with C when you believe you have captured enough packets Language Conversion Tool Find n Secure provides a helper tool for converting software into your local language You need to have a username and password to log inside this tool which you can obtain by posting an email to support findnsecure com with subject lines as user pass for language conversion tool You can visit http www findnsecure com language html to access the language conversion tool Write your username and password in the login box shown below and click over login button Please perform login before proceeding to editor Password After you login successfully inside the tool the screen shown below will come up It is divided into four sections Key Panel Current Text New Text h U N ao Computer aided translation
48. e database server on the application server itself then the value of this property will be localhost otherwise you can set it appropriately For example if a server with local IP 192 168 1 10 is hosting MySQL service then we may use the following settings DBFServername 192 168 1 10 Username through which the connections to the 40 Find n Secure Version 2 0 Instruction Manual DBFDatabase Database name to be used by findnsecure applications MySQL can be used by multiple softwares running over your server and each software may have its own database Similarly Find n Secure version 2 0 has its own database by default it is named as fnsv2 If you want to change the name of the Database file you may modify accordingly LicenseUsername Find n Secure license username provided by the company i e Embarc Information Technology Pvt Ltd Setting up triggers Find n Secure version 2 0 supports an important facility to perform operations in conjunction with 27 Party software which are capable of passing URL with parameters in GET request format or directly connecting with the software backend and pass triggers using network This provides exceptional facility of extending software capabilities with customized applications designed over the base platform of Find n Secure The illustration below shows the communication channel and the flow of process Chapter 3 Software I
49. e is a very reliable and fast GPS Software Service will be started in following runlevels B 0 1 e S Start Stop Refresh Set Reset Help Cancel OK e Click on Set Reset e Click Enable the service e Click OK and Save changes Find n Secure software will now automatically start whenever your server boots up Summary We have covered all the topics required for setting up the server and this chapter completes the configuration and installation of your server After following the steps explained in the preceding paragraphs your server should be running and ready to add new user accounts and trackers to the software which we shall show you in the subsequent sections In case you face any trouble with Linux you can use the following references to solve the issues Linux Administration Handbook Pearson Education by Nemeth Snyder and Hein http www opensuse org Email your queries to support findnsecure com 45 Chapter 3 Software Installation Bible Red Hat Linux Wiley 46 CHAPTER 4 Administration In this chapter we will take a walk through of Find n Secure from an administrator s point of view We will start with the login and then proceed to all the detailed steps required for proper functioning of the software Newly installed software on the server is by default provided with an administrator account with the username admin and password admin It is i
50. e is in start condition but not moving 74 Find n Secure Version 2 0 Instruction Manual Stopped Tracker is stopped and no movement is registered No Data Tracking unit has not communicated with the server for more than 24 hours Alerts Tracking unit needs your attention due to some event happening on site of the tracker Along with the icon notification textual representation is also displayed on the tracker list for the people who are new to the software and have difficulty in understanding the icon representation In a real time scenario you might wish to track more than one tracking unit and to enable this we have provided you with the facility of opening an external window simply by clicking over the window icon Find n Secure Version 2 0 Name Iklakh Ahmed Mobile 9760020592 Speed 27 km hr Date Thu 6 Aug 2009 Time 10 42 59 PM Lat Lng 13 11801 80 19808 ao Be rr Maal lt Geka Ed 18 K RA Baba Tr Colony O Abhirami Nagar B North 3 tee Jawahar Jagannatha Villivakkam Rajaji I gt Nagar i B 3 Nagar ys E ay get 7 D af South e a m DES a f Jagannatha a nni Perambur D B X E Nagar Vi iva SE CH oco Works A a us T nus a w DR T Periyar 13 DR di de Nagar 2000 ft 1 km Report Sensors Alerts Distance vs Time History amp Controls 104 Distance 1 94 Kms panen Avg Speed 31 44 km hr Max Speed 37 03 km hr Last Update Thu Aug 6 22 42 59 2009 1 E 3 5 S
51. ec Place 0 01 Kms from Jawaharlal Nehru Rd Villivakkam Chennai Tamil Nadu India 75 Chapter 6 Users Interface Tracking Map Initially when you login the software group mode is shown In group mode all the trackers are shown on the map collectively and updated as they move and their status icons modify as per the current status You may select the option of plotting your trackers over Google maps or Microsoft virtual earth whichever is your preference the method of working remains the same The screen shot below shows ten tracking units present over the map identified by the name A to J and different colors show different status of the units E e a At winch Wan Gm zh Jang i CH ee Ee me A es e Pa Zu gt JRE Xining 81 sn Ai EA EH E A ATaiy uan Ni e kA Kean L Sr EE e een Ed oa o Wu an Ehongging G Get baten Britany E ch oe ae a Changsha SE O hairal hawa E ee ae E ke GZ ieegg e Jk t f 7 Lar ai Ki Za e F 3 wf I i AU Siranagan 5 ae si d De E 5 uang dent paa TZ e o KC Nanning zA Ahmedabad h Sabroom E 1 Barisal Sk ei Myanmar d pS b fBurma 2 Dien Bie En Hong Ha ko T Macau Ge 7 henna imbatone TE E EE Mullaitiva 500 mi a IELE Y 3 pee eS RA d Palembang a imagery 2000 Tiifabletrics Map dala 2009 NFGIS Tele Atlas LeadDog Consulting AND MapIT Europa Technologies Terms of Use The screenshot above is a standard rep
52. ed 2 All the keys starting with IMAGE_ contains the path for the language dependent images and therefore you should change the path as per your language for example if you are converting from English to French the path will be srv www htdocs images english xyz png convert it into srv www htdocs images french xyz png 67 Chapter 5 Advanced Tools for Administrators 3 Save to the server should be done once you have finished editing for the day or for the time being as this is a lengthy operation Once you have completed the process of language conversion you are required to drop an email to supportefindnsecure com with the subject line Translation Complete lt Username gt for example you logged in the software with username findnsecure you need to send the email with the following subject line Translation Complete findnsecure Once this email is received our servers will generate the corresponding files and inform the Find n Secure technical team Setting up MySQL mirror Server failures are unavoidable and can make you lose all your vital data related to tracking of the units and in such a scenario it is most crucial to make the service up and running as soon as possible To keep your service running all the time with 99 99 uptime you need to setup the infrastructure that allows you to have redundancy in the data so that in the eventuality of your primary server going down you can switch to your secondary
53. eful are a Taxi Management b Directing police vehicles to the place of crime c Sending out fire brigades to the place of fire incident In the screenshot below you can see there are ten vehicles placed all across India Clicking anywhere on the map places a balloon icon over the map to mark the place of destination and updates distances of all the vehicles in the left side list in ascending order of distances This is a live module as the vehicles keep on changing their positions Distances are updated automatically Once you have identified which vehicle should be sent to the desired location you can click over the vehicle icon on the map and it shows you details of the particular tracker along with the name of the driver and his mobile phone number which makes it easy for you to give instructions 88 Find n Secure Version 2 0 Instruction Manual to the driver Thus fleet management becomes easy and simple beyond imagination LC Find n Secure Version 2 0 vr ov AN j ot EA 8 A DN SL FO s 2 de si m mmu Pines CN ch be gt e NIE Ne d ab Himachal 4 EH C CR EE Pradeshi eE af gt eN Soh e IC ALELLA ae Trackers List ys Y A i gt P BEER shang 9 Lahore Kar A Aen ndn M Distance 6 5 2 y 3 NLO2G 3233 355 15 Kms REISE DFU 7 T Meer NLO2G 3202 471 44 Kms AUT Te 1 Uttar New Delhi NLO1D 6262 621 17 Kms NLO2G 4071 780 53 Kms NL
54. ess or geographic area Geofencing is commonly used to manage mobile employees A broad range of geofencing applications potentially lies ahead The following lists just a few of the current geofencing uses e Manage a fleet of delivery drivers service technicians sales representatives school buses taxis snowplows and town vehicles within a region e Limit fleet travel and sales regions to specific routes e Ensure up to the minute safety of valuable hazardous or dangerous cargo 90 Find n Secure Version 2 0 Instruction Manual e Manage employees by exception rather than scrutinizing trusted employees e Provide advance warning of arrival at customer sites docking bays and ports in order to minimize loading and unloading delays e Prevent crossing of city state or regional borders or out of country cargo shipments e Provide warning that a child family member or pet is leaving a yard block or city limits e Remotely disable vehicles if a boundary that has been crossed is restricted unauthorized or unsafe e Alert victims of the approach of a known violent or sexual predator e Track domestic violence or sex offenders to enforce probation Stipulations e Prevent vehicles from being stolen or used for unauthorized or illegal purposes e Prevent wildlife from infringing on livestock or crop raiding such as in the case of Kenya s Save the Elephant group Find n Secure software is equipped with sta
55. f travelling Details of various inputs like fuel sensor temperature and camera images History of the events occurred over the unit since the time of your login Graphical analysis of the distance versus time Expected time of arrival Graphical analysis of the speed Tools for viewing history and controlling the tracking unit Facket Place 0 03 Kms from National Highway 5 Mettuppalaiyam Pozhal Tamil Nadu India Option Distance Avg Speed Description Distance travelled since the time you have activated individual mode Average speed of the tracking unit 79 Chapter 6 Users Interface Last Update Date and time when the last location was sent by the tracker to the server Distance vs Time Distance versus time graph shows the distance travelled between each reporting interval Pause Map Sometimes you wish to pause plotting on the map in case you are doing some analysis of the tracking unit This option lets you pause the tracking and allow you to conduct your analysis work and later when you resume all the points arrived during the pause interval are plotted over the map and live tracking is resumed Sensors Tab This panel contains fuel temperate and real time visual display from the vehicle Fuel meter is an analog meter which constantly moves left and right as per readings from the tracking sensor Temperature values supported by the software are from 40 centigrade to 80 centigr
56. fer ServerSendBuffer MinSendTime MailerCommand NumberOfTriggers This property allows you to start TCP server for communication with the tracking units This is equivalent to the UDPServerName and has similar default value For internal use of the software For internal use of the software UDP sending server is started on this IP address for performing communication with the tracking units UDP sending server port number on which service is to be hosted For internal use of the software For internal use of the software For internal use of the software For internal use of the software For internal use of the software For internal use of the software For internal use of the software Software has a daemon process which constantly keeps on checking for the new alerts events happening on the server These alerts events are processed by a mailer script which is by default written in PHP 5 0 If you need to modify this behavior of the system you can insert your own script and place the right command here to process accordingly By default the value of the property is php srv www cgi bin mailer php Number of triggers configured over the server to be received by UDP server As described below under the properties Trigger x Name Trigger x Event Trigger x Offset you can configure various triggers in the software to be executed when this command is received by UDP Server It may be used along with any 3 par
57. g file size to 25 of buffer pool size tinnodb log Tile size OOM innodb log buffer size 8M innodb flush log at trx commit 1 innodb lock wait timeout 50 27 Chapter 2 Linux Configuration mysqldump quick max allowed packet 16M mysql no auto rehash Remove the next comment character if you are not familiar with SOL safe updates isamchk key buffer 256M Sort Butter size 06M edo butter M WELGe DULLeL 2M myisamchk key buffer 256M SO L Butter Size 256M read buffer 2M write buffer 2M mysqlhoteopy interactive timeout Speed Tweak Tweak compresses the content of your web server in real time barring a few formats that will have no or nearly no benefit from it images and or already compressed files like a zip or files that may even become corrupted when compressed further e g the pdf format Basically at the cost of a little bit of CPU time pages will become smaller with the following benefits e Faster loading pages e Lower bandwidth costs 28 Find n Secure Version 2 0 Instruction Manual For more information just search for http compression keyword in any internet search engine mod _deflate This module enables http compression over the Apache server The following process helps in activating mod_deflate on Apache server over Linux 1 Open your favorite console application Xterm Konsole etc 2 Execute a2enmod deflate
58. ging tools which may be used for troubleshooting in case you don t see data on your server we will visit them at the end of this chapter to help you in resolving issues 52 Find n Secure Version 2 0 Instruction Manual d n Secure Administrator Control Panel Modify Password Logout Add Tracking Unit ae ae ee ee ee ae Users Management SC x Please enter the details in the form below Fields marked in Red colour are necessary Database Management Backup Device ID 197951 6 Digit Code Trackers code _ User custom device ID Administrator Home Tracker Type FS 11 e Settings Tracker Name Tracker SIM No IMEI Number 0000000000000 Contact Name Contact Mobile Remarks Speed Limit Alternate Email Individual Public Add Tracker Done Powered by Field Name Description Device ID Software uses Device ID or IMEI number to identify device and perform related tasks Device ID is always a unique number on the server User custom In certain circumstances you might need to use a custom device ID device ID such as adding an already configured unit Tracker Type Different make models of the tracking units are supported by the software Select the correct type as per the tracker to be configured You can get an updated list of the tracker supported by Find n Secure from support findnsecure com Tracker Name Name by which the tracking unit is represented when the 53
59. gned to the group e Individuals only one single tracker can be assigned to this type of account e Public Map a tracker belonging to Group or Individual account for public access e Customer Care Customer Care agents can be assigned this account for controlling all other accounts Each category has two types of accounts viz Active Accounts and Inactive Accounts Where the user of an account has logged in during last thirty days such accounts are categorized as Active Accounts while all others fall under Inactive Accounts category 50 Find n Secure Version 2 0 Instruction Manual The following steps will help you in the creation of a new Group Individual account and adding a tracking unit to the account e Click on Create New User e Select Account Type as Group for Multiple Tracking Units or Individual for Single Tracking Unit e Select Account Expiry date login will be automatically disabled after this expiry date unless it is extended further e Assign unique username with which this account will be identified on the server system In case username already exists on the server it will notify that the username already exists In such a case you are required to assign some other username e Assign password to access the account The password should be a strong one i e which may not be easily imitated by an unauthorized person It is preferable that the password should be a combinat
60. ice Selection Here you can select the interfaces on which you want to enable HTTP Service Please note that it is essential to enable HTTP Service on loop back address 127 0 0 1 Once you have made the selection click Next Next screen displays the options to enable scripting over the server You need to check Enable PHP5 Scripting and click Next Next screen shows you parameters of Default Host On this page you need to REMOVE the following entries Alias icons usr share apache2 icons Directory usr share apache2 icons 21 Chapter 2 Linux Configuration After this screen you will see Virtual Hosts configuration screen where you can simply click Next and then comes up the last screen Summary On this screen click over Start Apache2 Server When Booting and click Finish This completes the basic configuration of Apache server Screenshot below shows up the last screen of configuration wizard for HTTP Server F YaST2 Control Center linux p3sr File Edit Help E Software A Cl DHCP Server hal DNS Server P Hardware YaST2 E system HTTP Server Wizard 5 5 Summary Ke Network Devices Service Start Il Network Services e Start Apache Server When Booting geg Start Apache2 Server Manually SPP Novell AppArmor t B Security and Users Listen On LJ Virtualization all port 80 Fs rt uppo Default Host X Miscellaneous in Search SS
61. ield you may enter the list of the ports you wish to enable in the firewall separated by spaces for e g 21000 5901 80 Follow similar procedure for the UDP Ports field F YaST2 Control Center opensuse32 File Edit Help I Es Software El YaST2 lt 2 gt TUE Hardware Start Up g Firewall Configuration Allowed Services Lal Interfaces System ad Eet Allowed Services for Selected Zone Ke Network Devices Extemal Zone y i ESCHER see Suli ter additional port a Additional Allowed Ports Logging ere enter tional ports or Bice Novell AppArmor Custom p Protocols to enable in the firewall zone Settings for Zone External Zone i Security and Users LL Virtualization O Support TCP Ports and UDP Ports can be TCP Ports entered as a list of port numbers ES port names or port ranges separated by spaces such as 22 21000 5901 80 UDP Ports E http or 137 139 PR Miscellaneous 80 benennen RPC Ports is a list of RPC m Search services such as nlockmgr RPC Ports ypbind or portmap separated by spaces IP Protocols IP Protocols is a list of protocols ja such as esp smp Or chaos separated by spaces Find the current list of protocols at http www iana org assignments p rotoc ol numbers Cancel lt gt Advanced __ Protect Firewall from Internal Zone Help Cancel Back Next
62. ifferent modes namely moving stopped idling no data amp alerts In the first combo box you need to select the type of the icon you wish to update among the following choices Moving Icon No Data Icon 1 2 3 Idle Icon 4 Stopped Icon 5 Alerts Icon Once you have selected the type of icon you need to identify the tracker from the combo box below it After this click on the Browse button to select the icon image which you wish to assign and click the Upload button The last option in the type of image is the profile image option which updates the image that appears in the profile section when you log in to the software This image can be your company logo or your vehicle or anything you wish to be displayed there Images Please select type of image to upate Please select tracker Select file 104 Find n Secure Version 2 0 Instruction Manual The sizes of the icons and images should be kept within the parameters mentioned below otherwise they will take time to download and will be of no use e Icons 23x23 pixels e Profile Image 60x60 pixels File format being uploaded should be in PNG Some common icons can be downloaded from the www findnsecure com downloads html Forgot Username Password If you have forgotten your login username password then on the login screen you will see the Forgot Password option on which you can click and feed in your email address which is registered
63. ing mobile phone for GMAIL push email can be had from http mail google com support bin topic py topic 12760 The other method is to setup email account such that email from a specified email id is delivered as sms to the mobile phone of the user Hotmail www hotmail com and Yahoo www yahoo com provide this type of service is many countries There are country specific services too for email to sms delivery Please check with your GSM operator for details ww TE gi 108
64. intros Eee UEL Find n Secure Automatic Tracking amp Security Software es Find n Secure Aurtomabe Tracking amp Security Sofware Embarc Information Technology Pvt Ltd Copyright 2 March 2009 All rights reserved Notice This manual as well as the software described in it is furnished under license granted by Embarc Information Technology Pvt Ltd to authorized clients and may be used only in accordance with the terms of license granted The content of this manual is furnished for informational use only is subject to change without notice and should not be construed as a commitment by Embarc Information Technology Pvt Ltd While every care has been taken for the correctness of the information Embarc Information Technology Pvt Ltd assumes no responsibility or liability for any inaccuracies that may have inadvertently crept in this manual Embarc Information Technology Pvt Ltd reserves right to make changes to specifications features utilities at any time and without notice The information furnished by Embarc Information Technology Pvt Ltd in this manual is believed to be accurate and reliable Embarc Information Technology Pvt Ltd assumes no responsibility for its use or for infringements of patents or other rights of third parties resulting from its use No license will be granted under any patents or patent rights owned by Embarc Information Technology Pvt Ltd Please check up for updated
65. ion e the second screen shot path of the icons is clearly visible History module is equipped with various options to enable analysis of the tracking unit These options are described in the table below Option Description Distance Travelled Total distance travelled by the tracker during the given period Animate Clicking on the Animate button starts animation of the tracking unit on the map to show its precise movements Reload History Reloads the history module Controls Vehicle tracking units may contain functions for controlling the vehicle Some standard operations are like e Force Location Update e Blow Vehicle Horn e Stop Vehicle Horn e Open Vehicle Doors e Lock Vehicle Doors e Block Vehicle Engine e Unblock Vehicle Engine Find n Secure Version 2 0 Instruction Manual All these operations can be controlled via web interface if your tracking unit supports them However the operations listed above may change with different make models of the tracking unit In order to send the command to the vehicle unit you are required to select the control command from the drop down combo box then select the channel of transmission i e GPRS or SMS and thereafter click Send Advanced Utilities Tools Find n Secure software is equipped with advanced utilities which you may require for performing various types of functions like knowing when does your vehicle reach a particular place without havi
66. ion of alphabets and numerals Names common in use should be avoided e Mention email address on which alerts generated by the software are to be delivered e Fill up the rest of the form for the new user which you are creating All the fields marked in red color on this form are mandatory and others are optional e Once you are done click on Proceed to next step 51 Chapter 4 Administration Find n Secure ITV EY ER Version 2 0 Administrator Control Panel Modify Password Logout Create Profile Users Management Please enter the details in the form below Fields marked in Red colour are necessary gt Database Management Account Type Group Account Expiry 07 19 2010 44 e fej Backup n Username embarc Minimum 4 characters Administrator Home Password Minimum 4 characters e Settings Email Company Name Gender Address Postal Code Mobile Website http Group Individual Public Country Not in list Proceed to next step Cancel Powered by d Adding Tracking Unit After you press Proceed to next step a new form opens up for adding tracking units to the profile This form is shown in the screenshot given below It is important to fill up this form with careful understanding otherwise your server will not be able to identify your tracking units and you will not see any reporting on the server There are many debug
67. ll Konsole o Session Edit View Bookmarks Settings Help end Optimizer 3 3 0a ZEND LICENSE AGREEMENT Zend Optimizer ZEND TECHNOLOGIES LTD ZEND SOFTWARE LICENSE AGREEMENT AGREEMENT IMPORTANT READ THESE TERMS CAREFULLY BEFORE INSTALLING THE SOFTWARE KNOWN AS THE ZEND OPTIMIZER AS INSTALLED BY THIS INSTALLATION PROCESS IN MACHINE EXECUTABLE FORM ONLY AND ANY RELATED DOCUMENTATION COLLECTIVELY THE SOFTWARE BY INSTALLING OR OTHERWISE USING THIS SOFTWARE YOU THE LICENSEE ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT AND THAT YOU AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT YOU ARE NOT AN AUTHORIZED USER OF THE SOFTWARE AND IT IS YOUR RESPONSIBILITY TO EXIT THIS INSTALLATION PROGRAM WITHOUT INSTALLING THE SOFTWARE OR TO DELETE THE SOFTWARE FROM YOUR COMPUTER 1 License Subject to the terms and conditions of this Agreement including without limitation Section 2 hereof Zend hereby grants to Licensee during the Term as defined below a limited a non exclusive 9 lt BXIT gt MM Shell 31 Chapter 2 Linux Configuration 2 You may proceed with the default installation path or if you are an advanced user you can modify as per your requirements Shell Konsole XS Session Edit View Bookmarks Settings Help Zend Optimizer Installation end Optimizer 3 3 0a Please specify the location for installing Zend
68. m their website http www wireshark org 64 Find n Secure Version 2 0 Instruction Manual ME The Wireshark Network Analyzer File Edit View Go Capture Analyze Statistics Help EI Z Fiter v Expression Clear of Apply O Mm About Wireshark Wireshark Authors Folders Plugins License i Network Protocol Analyzer Version 1 0 4 Copyright 1998 2008 Gerald Combs lt gerald wireshark org gt and contributors This is free software see the source for copying conditions There is NO Compiled with GTK 2 14 4 with GLib 2 18 2 with libpcap 0 9 PRE CVS with libz 1 2 3 without POSIX capabilities with libpcre 7 8 without SMI with ADNS without Lua without GnuTLS without Gerypt with MIT Kerberos without PortAudio without AirPcap Running on Linux 2 6 27 7 9 pae with libpcap version 0 9 PRE CVS Built using gcc 4 3 2 gcc 4_3 branch revision 141291 Wireshark is Open Source Software released under the GNU General Public License Check the man page and http www wireshark org for more information warranty not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE Ready to load or capture No Packets 1553 don ei Ben ma Profile Default Capturing with tcpdump for viewing with Wireshark There are occasions when you want to capture packets using tcpdump rather than wireshark especially when you want to do a remote captur
69. matically fixes the time as per your time zone requirements and displays the data to you Browse Timezone set is 5 5 GMT Admiristrator want to fetch data for 6th June Starting time 5th June 12 00 00 AM 5 5 4ours 5th June 5 30 AM Fading time 6th une 12 00 00 AM 5 5 Hours th Jine 5 30 AM As shown in the illustration above if you need to fetch raw data for 5 June you will get the data from 5 June 12 00 00 AM to 6 June 12 00 AM Accordingly 5 June is added with 5 30 Hours and shown as 5 June 5 30 AM 58 Find n Secure Version 2 0 Instruction Manual and time shift by 5 30 hours so at the end of the day i e 6 June 12 00 AM time is again shifted by 5 30 and becomes 6 June 5 30 AM Find n Secure TT EY EL Version 2 0 Administrator Control Panel Modify Password Logout Database Broswer 2 Users Management Date Time Latitude Longitude Speed mph 7A 217 3 0221 Database Management gt g 3 Sun Jul 5 2009 05 32 59 AM 27 20202 78 02213 3 Sun Jul 5 2009 05 35 08 AM 27 20202 78 02213 a Backup _ Sun Jul 5 2009 05 37 19 AM 27 20202 78 02213 Ee Home _ Sun Jul 5 2009 05 39 30 AM 27 20202 78 02213 gt _ Sun Jul 5 2009 05 41 41 AM 27 20202 78 02213 E Settings _ Sun Jul 5 2009 05 43 54 AM 27 20202 78 02213 ge _ Sun Jul 5 2009 05 46 02 AM 27 20202 78 02213 _ Sun Jul 5 2009 05 48 13 AM 27 20202 78 02213 _ Sun Jul 5 2009 05 50 25 AM 27 20202 78 02213 _ Sun Jul 5 2009 05
70. mplete information about the database present on your server On the x axis you will see the following headings e Records Total number of records present in the database e Locations Total count of only location records e Events Total count of only events records Database chart is handy in analyzing the database load over the system and gives an overview of the database health to the administrator 48 Find n Secure Version 2 0 Instruction Manual Tracking Units Chart Tracking units chart shows the information about total number of units registered over the server and how many are working and how many units are in stopped state On the x axis you will see the following headings e Total As the name suggests if shows total number of units registered over the server e Working Count of all the units from which data is being received in past 6 hours from now These are termed as working units e Stalled Count of all the units from which data is not being received in past 6 hours from now Backup History Chart Whenever backup of the server is performed from the software its log is created and shown in this chart This is helpful in recalling when the last backup of the server was taken Accounts Chart Accounts chart shows the cumulative break up of all the accounts present on the server system On the x axis it has the following headings e Group Total number of group type accounts pre
71. mportant for you to change the password of the admin account on first login otherwise it may result in a security breach for your software In this Chapter as well as the Chapters that follow we shall be making use of the domain track findnsecure com you should replace this domain with your own domain to perform the exact steps Open web browser and go to the URL http track findnsecure com Put username as admin without quotes Put password as admin without quotes Select your preferred language Select your preferred time zone Click login After performing the above steps you will see the homepage for the administrator panel which is shown in the screenshot below Chapter 4 Administration Find n Secure Emr Administrator Control Panel Modify Password Logout Welcome to Administrator Control Panel Users Management Database Tracking Units Database Management 3600 Backup 3200 2800 Administrator Home 2400 2000 Settings iaga z a o c ns n Total Working Stalled Backup History 1 0 3 0 6 Group Individual Public 0 4 0 2 o Powered by Administrative control panel homepage comprises of four charts named as Database Tracking Units Backup History and Accounts Apart from these charts it has menu items Let us go through the chart items first and then we will explore all the menu options available on this screen Database Chart Database chart shows co
72. n required unique id between 1 and 2 32 1 defaults to 1 if master host is not set but will not function as a master if omitted server id 1 Replication Slave comment out master section to use this 25 Chapter 2 Linux Configuration To configure this host as a replication slave you can choose between two methods 1 Use the CHANGE MASTER TO command fully described in our manual 3 the syntax is 3 CHANGE MASTER TO MASTER HOST lt host gt MASTER PORT lt port gt MASTER USER lt user gt MASTER PASSWORD lt password gt 3 where you replace lt host gt lt user gt lt password gt by quoted strings and lt port gt by the master s port number 3306 by default Example CHANGE MASTER TO MASTER HOST TIZ rk EE MASTER PORT 3306 7 MASTER USER 0e MASTER PASSWORD secret 3 OR 3 2 Set the variables below However in Case you choose this method then start replication for the first time even unsuccessfully for example if you mistyped the password in master password and the slave fails to connect the slave will create a master info file and any later change in this file to the variables values below will be ignored and overridden by the content of the master info file unless you shutdown it the slave server delete master info and restart the slaver server For that reason you may want to leave the lines below
73. n track findnsecure com IP Address 122 160 144 32 Once your domain is set you need a Google Maps API key which may be generated from the following link http code google com apis maps signup html SMTP Settings Simple Mail Transfer Protocol SMTP Server is used for sending emails from the software to users and administrator If SMTP is not properly setup then you will not receive any mail alerts from the software If you don t have a SMTP server Find n Secure version 2 0 allows you to use Gmail if the sending load is not very high If you are using the software for providing commercial service we recommend you to use a paid SMTP server or setup your own SMITP server whichever you prefer SMTP Server Server address for the SMTP server For example 37 Chapter 3 Software Installation smtp gmail com Gmail SMTP server SMTP Port Port number on which the server SMTP service is being hosted Default SMTP port is 25 Authenticate SMTP If SMTP server requires authentication then this option must be checked SMTP Username Username to be used for logging into SMTP server SMTP Password Password to be used for logging into SMTP Server SSL Authentication Check this option if SMTP server requires Secure Enabled Sockets Layer SSL Authentication It is more secure to use SSL Authenticated email system since the communication channel is encrypted Admin Email Please put the administrator email address here
74. ng is running fine simply issue mysql p in the terminal It will ask you for root password which you issued in the command e g findnsecure in this case After you press enter you will see the Welcome Screen of MySQL just type exit on the prompt to return to terminal prompt MySQL Configuration File As MySQL is the most important component of the system it is essential that it performs with ultimate efficiency and must be able to take up higher loads By default MySQL is configured to run on the minimum configuration which makes it a low end engine So we need to adjust some parameters for performance MySQL configuration file is present at location etc my cnf The listing below is an optimized version of my cnf file for a Server having 1 2 GB RAM You may find some good examples at http forge mysql com MySQL Configuration file for Servers with 1 2 GB RAM my cnf 23 Chapter 2 Linux Configuration http dev mysql com doc refman 5 1 en server options html http dev mysql com doc refman 5 1 en option files html 3 You can also dump all the variables set for mysqld with 3 3 mysqld verbose help Example MySQL config file for very large systems 3 This is for a large system with memory of 1G 2G where the system runs mainly MySQL 3 You can copy this file to etc my cnf to set global options mysql data dir my cnf to set server specific options in this installation
75. ng to be online and watching it Find n Secure comes with the following utilities 1 Locating nearest tracker e vehicle person Geofencing drawing Polygon and Circular Report generation Geofence management 2 3 4 Account maintenance 5 6 Directory maintenance 7 Images Icons uploading You may access these tools by simply clicking over the Advanced Utilities button in the menu bar Find n Secure bg Version 2 0 D Advanced Utilities G Google Maps m Microsoft Virtual Earth After clicking the Advanced Utilities button the toolbox as shown below will appear and you may click on the button for the utility which you wish to execute see 87 Chapter 6 Users Interface H 3 stop NV SO a pause RS A RET KE Geofence Reports Account Geofence EA Management e Images Please click over the above tools Locator Locating nearest tracker First tool that appears in the Advanced Utilities toolbox is the locator tool This tool is primarily used for finding out the closest tracker may be a vehicle to the location of dispatch Click over the icon Locator to open this tool and it is as simple as one click on the map to your desired location of dispatch and you get the live module fetching location of the tracking units and updating their distance as per their movement towards or away from the dispatch location Some of the areas where this tool may prove us
76. nstallation Trigger Name locate Trigger Event fsrviwwvdcgi bin jlocate php GPRS A I rigger 1 Trigger 2 Trigger executed internet ager Backend Engine SMS Gateway Apache ke Find n Secure config sys file allows you to expand the triggers as mentioned in the previous topic You can develop PHP scripts which may be placed in your own folder for execution Let us show you a custom trigger example using Apache web server Create a new folder by name customeevents in srv www cgi bin Create a new file by name test php in srv www cgi bin customevents Source code for this test script is shown below lt php Find n Secure 2009 URL sent to apache is in the following format http track findnsecure com cgi bin customevents test php tid 12345 amp pass test 42 Find n Secure Version 2 0 Instruction Manual Parameters tid Tracker ID pass Password of the user account associated with the tracker ID Objective This program takes in the tracker ID and prints out the username You can make use of Apache URL calling to perform inquiry ZE require once mysql php function dberror emsg print Semsg die db mysql connect localhost user pass 1 mysql select db fnsv2 or dberror database error Squery SELECT FROM trackers where trackerid GET tid X result mysql query query db
77. o the login screen enter username as root and your system administrator password and proceed to login If you have installed KDE as your Desktop Manager you will see the screen similar to the one shown below er root on opensuse32 openSUSE x 6 Search Ja YaST Install Software d System Information Home t d Network Root ae Trash Favorites Applications ol Recently Used Leave ei 1848 Ces a KDE Desktop is pretty intuitive and fairly simple to configure We will now take you quickly through the steps of configuration You may configure almost complete Linux from the YaST tool in OpenSUSE As you see in the above screen shot YaST took will appear after you click on the Computer Tab Chapter 2 Linux Configuration Firewall By default OpenSUSE turns Linux firewall on Generally servers connect to the internet via Routers and mostly all the new routers have in built firewall system which forces the firewall on the whole network If you don t have any special configuration for your private network then you should disable Linux firewall and use router firewall Whether you use Linux firewall or router firewall you will be required to enable inbound traffic from the following ports for successful communication Service Name Port Number Protocol HTTP Server Apache 80 TCP Tracking Port 21000 TCP UDP VNC Remote Administration 5901 TCP In order to disable firewall or enable particular ports
78. of tracking units that are assigned to you These are directly controlled by the administrator of the software and in case you wish to expand the fleet you may contact the administrator and get the relevant hardware and expand your fleet Account expiry shows the date until which your fleet will be supported and after that you need to renew your account with the service provider Trackers List This section displays with the name of all the trackers which you have installed in various vehicles or name of people holding the personal trackers or for whatever reason you are using the trackers 73 Chapter 6 Users Interface Trackers List Icon Name Status NLO2G 3240 Stopped NLO26 099 Moving NLO26 4071 Stopped NLO 266 4063 Stopped NLO26G 2594 Moving NLO26 3223 Moving NLO2G 3202 Stopped we NLOZG 2557 Stopped NLO1D 6262 Moving NLO26G 3233 D D 3 D D E g H S Y op pp0p0pppoL p As you can see in the trackers list above it is in a tabular format which divides each tracker into Icon Tracker Name External Window Icon Status a O O o gt a o Icon Every tracking unit has its own set of icons to clearly distinguish various activities over the maps and give clear representation about the tracker status In version 2 0 of Find n Secure the following activities are supported Movement When tracker is moving Idling Mostly useful in vehicle tracking shows up when engin
79. on Find n Secure software Your username password will then be sent via email to your account Public User Interface Public accounts are used as a public utility account in which people whom you distribute the username password may only view the elementary information about the tracking and simple analysis For example a person hires a taxi from a fleet owner a company and he wants his to track the vehicle so hired by him In this case the Taxi Company the fleet owner will assign a User Name and password to their client who has hired the taxi Such a case will fall under public accounts This public accounts feature can also be used by parents to track the school bus in which their children are travelling As you can see in the screenshot given on the next page the following panels are deactivated from the public mode e Alerts e ETA 105 e History t Controls Chapter 6 Users Interface Additionally public accounts also disable the use of any advanced utilities like geofencing reports generations directory maintenance etc Find n Secure Distance Avg Speed Max Speed Last Update Version 2 0 Name Mobile Speed Date Time iG em gg KC a E mw ORT y y m d E d os x f f Shailendra Bansal 919897041111 32 km hr Fri 7 Aug 2009 08 16 40 AM gt i Lat Lng 52 32771 9 81635 9 Sr e et 5 j Ka AS BS pS Mailander Str d 2 ingitalGiobe Ehebye GeoContent AeroWest Map
80. oot from Hard Disk Repair Installed System Rescue System Firmware Test Memory Test Boot Options Language Video Mode Source Kernel Driver English US 800 x 600 DVD Default 8 ON el Braman YaST will present you with the Welcome Screen and options to select Language and Keyboard layout as per your regional requirements You may select any but English is preferable language to allow Find n Secure Customer Team to connect to your server in case of problems arising in the server Click on Next after selecting the Language and Keyboard layout After clicking Next OpenSUSE will Probe your hardware and gather information about the system on which it is running both the screens are shown below 10 Find n Secure Version 2 0 Instruction Manual openSUSE 11 1 Welcome Preparation gt Welcome System Analysis Time Zone ka Language Desktop Selection Disk User Settings Keyboard Layout Installation Installation Overview Perform Installation License Agreement Configuration LICENSE AGREEMENT Automatic Configuration openSUSEe 11 1 This agreement governs your download installation or use of openSUSE 11 1 and its updates regardless of the delivery mechanism openSUSE 11 1 is a collective work under US Copyright Law Subject to the following terms The openSUSE Project grants to you a license to this collective work pursuant to the GNU General Public License version 2 By downloading installing or
81. resentation of Google map We will discuss some standard features of the maps here For detailed learning you may visit http maps google com 76 Find n Secure Version 2 0 Instruction Manual Bar on the left side of the map marked with and sign are used for setting up the zoom level and arrows above the bar are used for navigating map left right up or down On the top right side you can see four options available namely Map Satellite Hybrid and Earth Type Description Map Only map of the region without any satellite images will be displayed If your internet connection is slow speed one it is recommended to select this mode as it requires less data to be transmitted to your computer Satellite Only satellite images Hybrid Satellite images with map overlaid upon it Earth Activated Google earth inside the browser You are required to have Google Earth and geplugin installed in your computer You may visit http earth google com for more information about this You can zoom in the map towards the tracker by double clicking near the tracker icon on your map Tracker icons on the map are clickable and upon clicking them you see various details of the tracker for quick accessibility and unique geo coding mechanism war 10 Re ow Details Location Details Location Iklakh Ahmed e Distance 0 00 Kms 9760020592 Lat Lng 13 13783 80 21724 24 km hr d Jawaharlal Nehru Rd Thu 6 Aug 2009 Location Korattur Tamil
82. rowser you will require Adobe flash player 10 0 plug in installed over your favorite browser You can download the latest plug in from http www adobe com Once you have completed the above pre requisites you can simply open your favorite browser and visit http www findnsecure com and click over Members Login this will take you to the main software portal where you are presented with the login page asking for your credentials and change your preferences like language and time zone Chapter 6 Users Interface Login Please enter your credentials MIST UTC 5 30 Indian Standard Time BW Remember settings on this computer weg o Forgot Password Privacy Policy Terms of use language i application Service provider to whom you have subscribed assigns you specific username password which you should use to login the software In paragraphs that follow we will explore the user interface available for group and individual users Once you have successfully logged in the software you see a user friendly interface which is broadly divided into following sections e Menu Bar Advanced Utilities Google Maps Microsoft Maps Logout VV VV e User profile e Trackers list e Tracking Map 72 Find n Secure Version 2 0 Instruction Manual Find n Secure Version 2 0 a Advanced Utilities G Google Maps M Microsoft Virtual Earth Logout EE Ta ch Oe Ae Och Ser ES y CN Ge a O
83. s fast as possible to your clients and thereby increasing the overall efficiency of your fleet Click on the Directory in the advanced utilities to open the directory tool as shown in the screenshot below Find n Secure Directory User Details Office Phone Latitude Longitude AAA Update Search Criteria Name or Email Phone Number Any Copyright Embarc Information Technology Pvt Ltd You can feed the details of your clients in the fields of this tool Two fields are mandatory viz Name amp Mobile number Once you have completed the entries simply click on the Add button to save the details on to the server Directory services are equipped with extensive search module in which you can perform search on basis of the following 1 Name or Email 2 Phone number 3 Any Once you have performed the search you may click on any of the records that come up in the search list to load it on the screen Two unique fields in this Directory are Latitude and Longitude of your client which you can find out from the live module and feed in here Once you have 103 Chapter 6 Users Interface valid latitude and longitude you can use the Locate button to open up the Locator tool window automatically and check out trackers closest to your client place Images This utility of the software is meant for customizing the looks of your Graphical User Interface GUI All the trackers may have their custom icons for d
84. sent on the server e Individual Total number of individual accounts present on the server e Public Total number of public accounts present on the server Administrative tasks Under this section you will find complete set of utilities required for performing the administrative tasks such as accounts creation adding of trackers assigning public ID s performing backup etc We will now move step by step to demonstrate how to create setup and perform various administrative activities Users Management As the name suggests this option allows you to create modify remove the user accounts from your server and help you in associating various types of tracking 49 Chapter 4 Administration units to the user accounts We will now help you in setting up one demo account and associate one tracking unit with it Click on Users Management Find n Secure EY ES Version 2 0 Administrator Control Panel Modify Password Logout Users Management 2 Users Management Groups Individuals Public Customer Care Create New User gt Database Management Active Accounts Inactive Accounts 0 Backup Modify User em SS d r Administrator Home Remove User Settings Block User Blocked Users Username Group Individual Public Powered by Unblock User As you can see in the screenshot above we have got four types of accounts viZ e Group allows multiple trackers to be assi
85. such as belonging to the group FS 2x units Each tracking unit is accompanied with an instruction manual which guides you how to setup the unit with the software It is possible to make use of the hybrid collection of trackers with the software It is very important to set the tracking unit properly in order to allow the software to recognize the hardware units correctly In case you are unable to configure the 56 Find n Secure Version 2 0 Instruction Manual units or confused about the hardware you can always get in touch with our customer support team which will guide you on specific hardware models Database Management Administrators should make use of the database management system to perform operations over the software databases We strongly discourage you from directly performing any operations on the database of the software as even the slightest error may render the whole system useless When you click on the Database Management option you see the following screen Find n Secure IT EY bee Version 2 0 Administrator Control Panel Modify Password Logout Database Management A Users Management Username Tracker Name Tracker ID Y amp acecomm X Database Management _ acecomm John Soon 377762 Y Bamitgoyal Fed Backup _ amitgoyal Amit Goyal 544699 em ur v i y Administrator Home Can anil Anil Anand 611495 ER N ger Settings _Janil Trident 207375 Y Bashish _ ashish Ashish Agarwal 487705 Y
86. te of art geofencing support to ensure maximum benefit Geofence Visual drawing tool Second icon in the advanced utilities is the geofence visual drawing tool as shown in the screenshot below It is somewhat similar to the locator tool in visual appearance i e left side is the toolbar helping you in drawing the geofence and right side is the map on which you can see and modify the geofence boundaries 91 Chapter 6 Users Interface SS Find n Secure Geofence Version 2 0 Geofence Drawing Panel Options Please select geofence type Mk Track Geofence Circular Geofence Radius 0 25 Kms Please select the fence Geofences J Fafi Ba L P ei G L i ar gt N Powered by Find n Secure 200 ft a Sp H i i dz Y 3 DORK 100 m i Imagery 2009 DigitalGigee GeoEye Map dalaB2009 Mapabe Eyfopatechnolegies Jems of Use Find n Secure version 2 0 supports two basic types of geofences 1 Track geofence up to 128 points polygon can be created 2 Circular geofence The following table describes the functions of various options present in the toolbar on the left side of the screen Options Description Track Geofence Select polygon mode for drawing geofence on the map Circular Geofence Select circular mode for drawing geofence on the map Clear Track mode Clears all the points on the map Circular mode Clear circular geofence on the map Radius Set radius of the circular geofence
87. th the following pre defined reports Report Geofence Description Gives you detailed description of the entry and leaving of the tracker from the geofence along with the names of the points of entry and exit 98 Find n Secure Version 2 0 Instruction Manual Trip Analysis Detailed description of the movement and the stopover of the tracking units along with the names of the places of stopover Overspeed Points where over speeding has happened Current Fleet Gives the complete report of fleet position along with their current status i e moving stopped or idle and the current position The most unique feature of the Find n Secure software is the raw data providing mechanism for the expansion of the reports You can make use of this facility in the enterprise version for creating custom reports by utilizing MySQL database system All the reports generated by the software are in pure HTML format which makes it possible to copy them in almost all the software like MS Word MS Excel Adobe Acrobat etc Chapter 6 Users Interface p Find n Secure Version 2 0 Reports Please select the type of report Please select tracker for which report is required Tracker Name NLO2G 3240 NLO2G 0997 NLO2G 4071 NLO2G 4063 NLO2G 2594 Start Date 08 03 2009 LEIT o E Minutes o E A AM pM End Date 08 04 2009 FETT 12 E Hinas e E em AN PM TT Generate report Copyright Embarc Information Technology Pvt Ltd
88. tiple fences on the multiple trackers by holding down the Ctrl key on your keyboard while selecting the trackers and the fences Deactivate Geofence By default periodic geofences are removed automatically from the server but for other geofences you need to remove them manually For this the functionality of deactivating the geofences is provided Click on the Deactivate Fence tab just next to the Activate Fence tab and you will see all the currently active fences on the server as shown in the screenshot below You may select single or multiple geofences whichever you wish to deactivate and simply click over Deactivate Fence button to deactivate them 97 p Find n Secure Chapter 6 Users Interface Geofence Version 2 0 ASAS SIC Deactivate Fence Tracker Name Demo 1 Demo 1 Demo 1 Demo 1 Demo 1 Demo 1 Demo 1 Demo 1 Demo 1 E Copyright Embarc Information Technology Pvt Ltd Reports Fence Name Office School Paliwal Park Lake Sikandra Mathura Kosi Palwal Faridabad NSEZ Start at Always On Always On Always On Always On Always On Always On Always On Always On Always On End at Always On Always On Always On Always On Always On Always On Always On Always On Always On Find n Secure software is equipped with handy to use reports Reporting is an essential tool when you need to do complete analysis of a tracker for a certain period of time Findnsecure comes wi
89. to the Installation of Find n Secure Version 2 0 We will take you through a simple installation process in this section along with some speed tweaking tips for your server Hardware Requirements Minimum Intel Pentium 4 HT 2 0 GHz or higher 80 GB HDD SATA 2 GB DDR 2 RAM 10 100 1000 Mbps LAN DVD Drive Reader or Writer Monitor CRT LCD g Keyboard tt Mouse Daz gt Recommended Intel Xeon 3 0 GHz or higher 160 GB HDD SATA 4 GB DDR 2 RAM 100 1000 Mbps LAN DVD Drive Reader or Writer f Monitor CRT LCD g Keyboard tt Mouse Ono Y D High speed internet connection with static IP is required for communication with the server We recommend minimum 1Mbps connection Linux Installation OpenSUSE Download latest version of OpenSUSE DVD for x86 32 Bit Environment from http www opensuse org At the time of printing of this manual OpenSUSE 11 1 is the latest edition available e Burn ISO file on a DVD Disc Chapter 1 Linux Installation e Insert it into the DVD drive of your server system e Start your server and Boot from the DVD ROM Please check your BIOS settings for enabling boot from DVD ROM if you face problems in booting from DVD ROM The following screen will come on the monitor of your server select Installation from the options present and wait for YaST to open up PU openSUSE 11 1 Running VirtualBox OSE E x Machine Devices Help openSUSE Installer B
90. to un check the option Automatic Login to disable automatic login If you wish to use different password for root account you should also un check Use this password for system administrator 14 Find n Secure Version 2 0 Instruction Manual openSUSE 11 1 Preparation Welcome Desktop Selection Disk gt User Settings Installation Installation Overview Perform Installation Configuration Automatic Configuration F Create New User User s Full Name Username findnsecure Password Confirm Password fl 0000000 lt EJ Use this password for system administrator BB Receive System Mail HB Automatic Login You Summary The authentication method is local etc passwd The password encryption method is Blowfish Change A are almost done Now comes the last screen of the OpenSUSE setup In this you need to select the packages you want to install over OpenSUSE Find n Secure is based on LAMP server i e Linux Apache MySQL and PHP We are now required to adjust the installation to get LAMP server installed follow the steps given below Click on Software Click on Details Scroll down to Server Function in left pane Check Web and LAMP Server option Click on Filter Select Search In Search textbox write down php and press Enter Right click in right pane Select All in This List gt Install Click Accept Click Ne
91. ty software to allow the expansion of the communication protocol We will demonstrate the process with 39 Trigger x Name Trigger x Event Trigger x Offset 0 BanUser x DatabaseRefreshTimer GeofenceRefreshTimer MailerRefreshTimer DBFServername DBFUsername Chapter 3 Software Installation the help of a small illustration after this table Represents the name of the Trigger which is to be sent to the UDP server to execute the trigger for example locate x represents number value from 1 NumberOf Triggers Represents the script execution path of the Trigger which is executed on receiving of the trigger Represents the offset of the command where server should search whenever a string is received by UDP server This property is used for banning one or more IP address for example BanUser 1 67 23 44 51 BanUser 2 67 23 44 55 Will add two IP address to the ban list and server will drop all the packets received from these IP addresses This property is used for setting up the performance for processing the data received by the server from the tracking unit The value is in seconds Time gap after which Geofence server checks for geofence related functions This property is in seconds Time gap after which mailer server fetches new alerts events This property is in seconds Database server name or IP address This is the address of your MySQL server if you are hosting th
92. using openSUSE 11 1 you agree to the terms of this agreement openSUSE 11 1 is a modular Linux operating system consisting of License Translations openSUSE 11 1 System Probing Preparation Probe USB devices Velcome Probe FireWire devices gt System Analysis Probe floppy disk devices Time Zone Probe hard disk controllers Desktop Selectior P Load kernel modules for hard disk controllers Disk Probe hard disks User Settings i Search for Linux partitions installation Search for system files Installation Overview Evaluate update possibility Perform Installation lt Initialize package manager Configuration Automatic Configuration Se me AeLe WS Probing hard disks Chapter 1 Linux Installation Installation Mode Screen is shown up after probing of the hardware is complete and here you have three options to select from a New Installation To perform a brand new installation b Update If you already have old OpenSUSE Linux installed over the server this option will update the older version to 11 1 c Repair Installed System In case you are having trouble in booting up the OpenSUSE system you can perform repair by making use of this option During the new setup you must select New Installation option and click over Next as shown below openSUSE 11 1 M Installation Mode Preparation y Welcome gt System Analysis s Time Zone Desktop Selection e Disk
93. version of user manual at http www findnsecure com downloads html Use of Google API Find n Secure software uses Google API Use of Google API is governed by the Terms and Conditions as described in the Google Maps API signup page http www gooele com apis maps signup html Printed in India Table of Contents INPFOQUELCION oien aE a a a a a EEEE 7 GPS Tacna Syste EEN 7 GPS Trackmno EE 7 COMMON USE enen E E R 8 Find MSE UE iea oaa e EEE es tne E E ENTE 8 LINUX INStalla tioN NEE 9 Hardware Requirements ie ENEE 9 ADNIA Ui RE 9 RECOMM ENE dpi sa 9 Linux Installation OPENSUSE AEN 9 LINUX CONFIQUIOTION EE 17 PIP CW EE 18 DiSADUNS Firewall A SA 19 Enabling Ports in Firewall Umush 19 Network Adapt El arresterer EE 19 Apache IT ras 21 NS EE 22 MySQL CONTSUFALION Ple sata 23 Speed WK 28 NOG MCST AUG no 29 COMPING IU eg 30 MySOLAU ee Cd 1 EE 30 ZENG ODUIMIZE ar A a 30 Software Iostellertmot ee gege REN ENNER de SEAN ESA ge ENEE AER ENNEN 34 Map Sg d sai 36 SMTP Setas as E 37 Understanding Configuration File config SYS ceeccceecceeccceecceeecces 38 SENS UAT Ss eee 41 MAS io A 44 SUMMA Y EE 45 ee WEE 47 Database Chats darla EEE ENEE A 48 TEFACKING WMS COTE ss AAA 49 Backup History CO us cial si 49 AC OUN CI Eeer de 49 lu wl geg dE 49 Users Management iii A Solana wweusegateetaeeetddesecaeess 49 Device 1D andIMENNUNDEF acusar rides 56 Database Management 97 BaCKUD ariran a E E R ERa 59
94. visit http www mysgl com to find out the latest server updates and download the fixes and upgraded versions and install it over the server Software is generally kept up to date and latest releases might require latest MySQL libraries to be installed over the server Zend Optimizer Source code of the findnsecure software is encoded with the Zend encoder and therefore Zend optimizer is required to be loaded on the server so as to ensure the proper execution of the software The following steps will help you in loading zend optimizer correctly over the server e Open the webpage http www zend com en products guard downloads e Select Zend Optimizer e Select the package type as Linux x86 32 bit TAR GZ e Download the file into root e Extract the file into root Zend e Open the terminal window 30 Find n Secure Version 2 0 Instruction Manual e Navigate to the folder root Zend by executing cd root Zend e Execute the following command sh install sh Zend installation will begin after this and you will see the welcome screen as shown below Press OK to continue and follow the under mentioned steps WE Session Edit View Bookmarks Settings Help end Optimizer 3 3 0a Welcome to the Zend Optimizer 3 3 0a Installation For more information regarding this procedure please see the Zend Optimizer Installation Guide lt EK os MN Shell 1 Read through the Zend Agreement and Accept it e She
95. vs Time ETA Speed History amp Controls Distance 0 40 0 42 0 40 Minutes Through this unique utility the software computes expected time of arrival based upon different paths and current travelling parameters For this you have to click on the Mark Destination button and the map will appear On the map mark your destination Thereafter click on Compute ETA For effective fleet management we strongly recommend that you should activate route learning capability by clicking on Start Route Learning and after the vehicle etc reaches destination click it again to save it to the server Distance vs Time _ Click over the Mark Destination button and then click over the map to mark your destination Once you are done click over Compute ETA to perform the computations Distance to be covered 2 1054 Kms DIRECT Estimated time required O Hours 13 Minutes 4 Seconds Options Description Distance to be covered Shows the left over distance along with the mode of operation for example 0 7228 Kms DIRECT or 1 7 Kms ROUTE 82 Find n Secure Version 2 0 Instruction Manual Estimated time required Mark Destination Compute ETA Start Route Learning Speed Graph DIRECT means software doesn t have any route present for the selected destination ROUTE means software has prior learning of the route and computes distance based on that learning Time required in reaching the destination This
96. xt 15 Chapter 1 Linux Installation This completes the requirements for installation After clicking Next OpenSUSE package installation will begin openSUSE 11 1 Preparation Welcome System Analysis Time Zone Desktop Selection Disk v User Settings Installation Installation Overview gt Perform Installation Configuration e Automatic Configuration M Perform Installation Slide Show openSUSE 16 openSUSE org openSUSE is a community project created and sponsored by Novell to deliver the world s most user friendly computing platform Many people from around the world contribute to the openSUSE Project by packaging software testing programs writing documentation and translating components into dozens of languages All of that work is available for free in the openSUSE Linux distribution available at www opensuse org Visit ww ensuse org How to Participate to learn how you can join the nsusE community Abort Back el a ST ay P A EES HARAN AR ne WS A Dd WW TN WMA EC y Lig kw d W a 4 WW gt Y u E UN Wl gt WW Te Y E ES Cri F A S XQ a Ay WWW be x Sec _ Ga Ve B or y 4 EN Ss Sg en Bate Sa gl In the previous chapter we have seen how to do a fresh installation over the server In this section will we learn how to configure Linux to maximize throughput Once your system completes the boot cycle it will come t

Download Pdf Manuals

image

Related Search

Related Contents

caution - SYSCOM WebGuard Login  Samsung SC6580 Kullanıcı Klavuzu  User`s Manual Boot Strap Loader Demo Kit  em anexo - Infarmed  翻訳後(日本語)の資料を見る  2 - SEW-Eurodrive  Berlin Heart  www.silverlinetools.com  User Manual  ND8401 - Vivotek  

Copyright © All rights reserved.
Failed to retrieve file