{"id":9358,"date":"2012-01-16T14:00:00","date_gmt":"2012-01-16T12:00:00","guid":{"rendered":"http:\/\/www.centsys.co.za\/useful-centurion-security-tips-2\/"},"modified":"2012-01-16T14:00:00","modified_gmt":"2012-01-16T12:00:00","slug":"useful-centurion-security-tips-2","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/","title":{"rendered":"Useful CENTURION Security Tips"},"content":{"rendered":"<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\"><em>Just because the holiday season is at an end doesn\u2019t mean criminals will be taking a break from their evil business \u2013 anything but!<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>We still need to be one step (or, if possible, several steps) ahead and the best way to achieve this is by taking proactive measures.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>We\u2019ve all heard that old adage:<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>prevention is better than cure \u2013 and that folk wisdom holds true when it comes to protecting our homes.<\/em> <\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">Here are some ways you can use your CENTURION gate motor or access control device to keep the baddies at bay:<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">If you have a <a href=\"http:\/\/www.centsys.co.za\/?q=ccategory,50,Keypad_Access_Control\">keypad<\/a> \u2013 remember to change the Master Code!<\/span><\/b><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">It\u2019s so easy to forget to change the default master code.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>If you take one thing away from this article, let it be to remember to change that little code.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>The Master Code generally operates Channel 1, and if you are using that channel to activate your gate motor and open your entrance gate, the default master code is all an intruder needs to gain access to your property and cause incalculable damage \u2013 so either <b style=\"mso-bidi-font-weight: normal;\">change your master code<\/b> yourself, ask an installer to do it for you, or contact our Technical Support call centre on 0861 003\u00a0123 (RSA only) so that we can guide you through the process<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 0pt 36pt; text-align: justify;\"><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">Make use of Positive Close Mode<\/span><\/b><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">Yes, criminals are clever, but that doesn\u2019t mean that their approaches aren\u2019t downright barbaric at the best of times.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>You may find that oftentimes your gate leaves a small gap when it\u2019s closed \u2013 a gap that might just be big enough to get a crowbar in.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Ergo, the evildoer now has access to your property through simple kinetics.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>The vast majority of our gate motors have the <b style=\"mso-bidi-font-weight: normal;\">Positive Close Mode<\/b> feature which allows the gate to close up right against the endstop \u2013 use it!<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">Intruder-detection Alarms<\/span><\/b><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">This feature is available on all our <b style=\"mso-bidi-font-weight: normal;\">D-Series<\/b> (<a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,7,D5Evo\">D5-Evo<\/a>, <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,8,D10\">D10<\/a>, <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,44,D10_Turbo\">D10 Turbo<\/a> and <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,13,VECTOR2__Linear_Swing_Gate_Operator\">VECTOR<\/a>) operators and allows you to turn your <b style=\"mso-bidi-font-weight: normal;\">infrared safety beams<\/b> into high-tech <b style=\"mso-bidi-font-weight: normal;\">intruder detection devices<\/b>.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Two different alarm configurations are available, namely:<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 0pt 72pt; mso-add-space: auto; mso-list: l0 level2 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0 <\/span><\/span><\/span><span style=\"font-family: Calibri;\">The <b style=\"mso-bidi-font-weight: normal;\">Break-in Alarm<\/b>, which will cause the onboard buzzer to emit a continuous tone whenever the closing beams are interrupted, and<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 0pt 72pt; mso-add-space: auto; mso-list: l0 level2 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: 'Courier New'; mso-fareast-font-family: 'Courier New';\"><span style=\"mso-list: Ignore;\">o<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0 <\/span><\/span><\/span><span style=\"font-family: Calibri;\">The <b style=\"mso-bidi-font-weight: normal;\">Ambush Alarm<\/b>, which will cause the onboard buzzer to emit a continuous tone if either the opening or closing safety beams have been interrupted for a pre-defined period of time.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>This is particularly useful since it means you will be notified of people loitering in front of your entrance gate or if your beam lenses have been covered or otherwise tampered with \u2013 the modus operandi of many modern criminals.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 0pt 36pt; text-align: justify;\"><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt 36pt; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">Keep the manual override access door locked<\/span><\/b><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">The manual override thumbwheel\/lever\/cam lock is used to disengage the motor\u2019s gearbox so that the gate can be operated by hand.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>It requires no great flight of fancy to imagine what criminals would do should they somehow gain access to this.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Apart from the fact that they would be able to override the gate motor\u2019s gearbox, they would also be able to remove the cover and gain access to a slew of other vital components such as the battery.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span><b style=\"mso-bidi-font-weight: normal;\">Keep the access door locked<\/b>!<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt 42.75pt; mso-add-space: auto; mso-list: l1 level1 lfo2; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">Be in the know<\/span><\/b><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">Only last year we introduced the <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,40,GSWITCH22\">G-SWITCH-22<\/a>, a GSM-based device that can be interfaced with a host of electrical devices for <b style=\"mso-bidi-font-weight: normal;\">monitoring and controlling<\/b> purposes.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Simply connect one of its dual inputs to your gate motor\u2019s controller and receive an <b style=\"mso-bidi-font-weight: normal;\">SMS notification<\/b> on your mobile phone <del cite=\"mailto:charlm\" datetime=\"2012-01-16T13:36\"><\/del><\/span><br \/>\n<span style=\"font-family: Calibri;\"><del cite=\"mailto:charlm\" datetime=\"2012-01-16T13:36\"><\/del>whenever the beams are activated or the power to the operator is cut.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>In addition <a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,41,GWEB\">G-WEB<\/a>, the associated web interface, allows you to upload transaction logs so you\u2019ll really be in the know.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt 42.75pt; mso-add-space: auto; mso-list: l1 level1 lfo2; text-align: justify; text-indent: -18pt;\"><span style=\"font-family: Symbol; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;\"><span style=\"mso-list: Ignore;\">\u00b7<span style=\"font-size-adjust: none; font-stretch: normal; font: 7pt\/normal 'Times New Roman';\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/span><b style=\"mso-bidi-font-weight: normal;\"><span style=\"font-family: Calibri;\">Keep rolling<\/span><\/b><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">Opt for a remote receiver that uses <b style=\"mso-bidi-font-weight: normal;\">rolling code technology<\/b>.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>Dipswitch and fixed code remotes are quite easy to duplicate, and it takes only a moderately determined criminal to figure this out.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span><a href=\"http:\/\/www.centsys.co.za\/?q=cproduct,19,Nova\">Rolling code-compatible<\/a> remotes, on the other hand, changes or \u201crolls\u201d its transmission data every time the button is pressed, making code-grabbing impossible.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div style=\"margin: 0cm 0cm 10pt; text-align: justify;\"><span style=\"font-family: Calibri;\">We trust that these tips and guidelines will help you keep your home or business secure not just over the festive season, but throughout the year.<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Just because the holiday season is at an end doesn\u2019t mean criminals will be taking a break from their evil business \u2013 anything but!\u00a0 We still need to be one step (or, if possible, several steps) ahead and the best way to achieve this is by taking proactive measures.\u00a0 We\u2019ve all heard that old adage:\u00a0 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[27,59,60,64,98,134,135,206,245],"tags":[],"class_list":["post-9358","post","type-post","status-publish","format-standard","hentry","category-centurion","category-d10","category-d10-turbo","category-d5-evo","category-gate-motor","category-home-automation","category-home-security","category-security","category-vector"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Useful CENTURION Security Tips - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Useful CENTURION Security Tips - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"Just because the holiday season is at an end doesn\u2019t mean criminals will be taking a break from their evil business \u2013 anything but!\u00a0 We still need to be one step (or, if possible, several steps) ahead and the best way to achieve this is by taking proactive measures.\u00a0 We\u2019ve all heard that old adage:\u00a0 [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2012-01-16T12:00:00+00:00\" \/>\r\n<meta name=\"author\" content=\"Charl Mijnhardt\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Charl Mijnhardt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/\"},\"author\":{\"name\":\"Charl Mijnhardt\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"headline\":\"Useful CENTURION Security Tips\",\"datePublished\":\"2012-01-16T12:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/\"},\"wordCount\":722,\"commentCount\":0,\"articleSection\":[\"centurion\",\"d10\",\"d10 turbo\",\"d5-evo\",\"gate motor\",\"home automation\",\"home security\",\"security\",\"vector\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/\",\"name\":\"Useful CENTURION Security Tips - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"datePublished\":\"2012-01-16T12:00:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/useful-centurion-security-tips-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Useful CENTURION Security Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/6afd42940835affc9fea5d60b03bbd23\",\"name\":\"Charl Mijnhardt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g\",\"caption\":\"Charl Mijnhardt\"},\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/charl\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Useful CENTURION Security Tips - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/","og_locale":"en_US","og_type":"article","og_title":"Useful CENTURION Security Tips - Centurion Systems French","og_description":"Just because the holiday season is at an end doesn\u2019t mean criminals will be taking a break from their evil business \u2013 anything but!\u00a0 We still need to be one step (or, if possible, several steps) ahead and the best way to achieve this is by taking proactive measures.\u00a0 We\u2019ve all heard that old adage:\u00a0 [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/","og_site_name":"Centurion Systems French","article_published_time":"2012-01-16T12:00:00+00:00","author":"Charl Mijnhardt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Charl Mijnhardt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/"},"author":{"name":"Charl Mijnhardt","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"headline":"Useful CENTURION Security Tips","datePublished":"2012-01-16T12:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/"},"wordCount":722,"commentCount":0,"articleSection":["centurion","d10","d10 turbo","d5-evo","gate motor","home automation","home security","security","vector"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/","url":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/","name":"Useful CENTURION Security Tips - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"datePublished":"2012-01-16T12:00:00+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/useful-centurion-security-tips-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Useful CENTURION Security Tips"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/6afd42940835affc9fea5d60b03bbd23","name":"Charl Mijnhardt","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f95e3317a72692ac83cadedc1b9a5dfb061967e746c01ba12a6573eac5a9c1b?s=96&d=mm&r=g","caption":"Charl Mijnhardt"},"url":"https:\/\/www.centsys.com\/fr\/author\/charl\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=9358"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/9358\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=9358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=9358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=9358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}