{"id":1235,"date":"2012-02-23T09:27:10","date_gmt":"2012-02-23T09:27:10","guid":{"rendered":"http:\/\/154.66.198.29\/?p=1235"},"modified":"2012-02-23T09:27:10","modified_gmt":"2012-02-23T09:27:10","slug":"remote-controls-a-genesis","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/","title":{"rendered":"Remote Controls: A Genesis"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]There is a popular (though probably misquoted) saying that declares that nature \u2013 and, by extension, humanity &#8211; should either \u201cadapt or die\u201d.\u00a0 Although this axiom was probably not intended to be taken literally, it does hold a certain amount of truth when it comes to security.\u00a0 As <strong>technology has advanced to become more sophisticated<\/strong>, more futuristic, so also has crime.\u00a0 It\u2019s almost as if criminals are using the very technology that we developed to keep them at bay, against us.\u00a0 There\u2019s been a definite evolutionary trend in crime.<\/p>\n<p>The good news is that <strong>we\u2019re still ahead<\/strong>.\u00a0 This blog post will look at how that staple of access automation \u2013 the <strong>remote control<\/strong> \u2013 has evolved to combat crime and how we are still on the winning side.<\/p>\n<p><strong><u>Dipswitch Days<\/u><\/strong><\/p>\n<p>Back when the world was young, dipswitch technology ruled with an iron fist.\u00a0 Dipswitch-based devices were easy to use and configure and could be employed for a plethora of applications.\u00a0 All that the user needed to do in order to synchronise a remote with a receiver was to set the little plastic switches in the same configuration on both devices and \u2013 hey presto! \u2013 the remote was programmed.<\/p>\n<p>Now, it doesn\u2019t take a great stretch of the imagination to see why this system might be considered vulnerable.\u00a0 With the ease of setup and use came glaring security flaws which could not be ignored, and so fixed code remotes saw the light.<\/p>\n<p><strong><u>Fixed Codes:\u00a0 The Next Generation<\/u><\/strong><\/p>\n<p>The advent of fixed code remotes dramatically increased the security of remote control systems.\u00a0 There were no visible switches that a mildly determined criminal might copy &#8211; all the coding took place safely within the airwaves.\u00a0 For a while, it truly seemed that this was a system that crooks could not circumvent.\u00a0 Criminals being criminals, they eventually devised a means of \u201ccode grabbing\u201d the transmissions and creating cloned remotes, thereby allowing them easy access into properties.<\/p>\n<p>But once again, goodness prevailed and \u2013 in true comic book superhero style &#8211; a revolutionary new technology dealt the hoodlums of the world a crippling blow.<\/p>\n<p><strong><u>Rolling Code Technology:\u00a0 The Final Frontier<\/u><\/strong><\/p>\n<p>Many of you reading this might be using CENTURION NOVA remotes and know them as the robust little blue and grey transmitters.\u00a0 What you may not know is that NOVA employs an\u00a0<strong>ultra-secure encryption technology known as rolling code, or Keeloq\u2122 encryption<\/strong>.\u00a0 This means that the code transmitted by the remote is always different to the previous one, with a <strong>possible 16 billion combinations<\/strong>.\u00a0 In addition to this, it also passes through a\u00a0<strong>sophisticated encryption engine<\/strong> which makes code-grabbing impossible.<\/p>\n<p>So, dear citizens, rest easy knowing that \u2013 while we may not wear masks and capes like traditional superheroes \u2013 we\u2019re still looking out for you.<br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a popular (though probably misquoted) saying that declares that nature \u2013 and, by extension, humanity &#8211; should either \u201cadapt or die\u201d.\u00a0 Although this axiom was probably not intended to be taken literally, it does hold a certain amount of truth when it comes to security.\u00a0 As technology has advanced to become more sophisticated, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[23],"tags":[],"class_list":["post-1235","post","type-post","status-publish","format-standard","hentry","category-blog-posts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Remote Controls: A Genesis - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Remote Controls: A Genesis - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"There is a popular (though probably misquoted) saying that declares that nature \u2013 and, by extension, humanity - should either \u201cadapt or die\u201d.\u00a0 Although this axiom was probably not intended to be taken literally, it does hold a certain amount of truth when it comes to security.\u00a0 As technology has advanced to become more sophisticated, [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2012-02-23T09:27:10+00:00\" \/>\r\n<meta name=\"author\" content=\"Eddie\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eddie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/\"},\"author\":{\"name\":\"Eddie\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"headline\":\"Remote Controls: A Genesis\",\"datePublished\":\"2012-02-23T09:27:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/\"},\"wordCount\":541,\"commentCount\":0,\"articleSection\":[\"Blog Posts\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/\",\"name\":\"Remote Controls: A Genesis - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"datePublished\":\"2012-02-23T09:27:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/remote-controls-a-genesis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Controls: A Genesis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\",\"name\":\"Eddie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"caption\":\"Eddie\"},\"sameAs\":[\"http:\\\/\\\/www.centsys.com\\\/fr\"],\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/eddie\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote Controls: A Genesis - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/","og_locale":"en_US","og_type":"article","og_title":"Remote Controls: A Genesis - Centurion Systems French","og_description":"There is a popular (though probably misquoted) saying that declares that nature \u2013 and, by extension, humanity - should either \u201cadapt or die\u201d.\u00a0 Although this axiom was probably not intended to be taken literally, it does hold a certain amount of truth when it comes to security.\u00a0 As technology has advanced to become more sophisticated, [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/","og_site_name":"Centurion Systems French","article_published_time":"2012-02-23T09:27:10+00:00","author":"Eddie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eddie","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/"},"author":{"name":"Eddie","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"headline":"Remote Controls: A Genesis","datePublished":"2012-02-23T09:27:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/"},"wordCount":541,"commentCount":0,"articleSection":["Blog Posts"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/","url":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/","name":"Remote Controls: A Genesis - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"datePublished":"2012-02-23T09:27:10+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/remote-controls-a-genesis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Remote Controls: A Genesis"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883","name":"Eddie","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","caption":"Eddie"},"sameAs":["http:\/\/www.centsys.com\/fr"],"url":"https:\/\/www.centsys.com\/fr\/author\/eddie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/1235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=1235"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/1235\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=1235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=1235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=1235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}