Frequently bought together:
Description
1. Mobile video, real-time surveillance video forensics.
2. Mobile phone information push. The camera starts the alarm, the monitoring area has abnormal conditions, the camera automatically sends the alarm information to the mobile phone or the designated mailbox (the mobile phone alarm requires the software to run in the background of the mobile phone)
3. Wireless connection, get rid of the shackles of the network cable and the computer.
4. P2P network penetration, where there is a network, you can see every move at home.
5. Support two-way voice.
6. Support storage loop recording.
7. Support multi-user platform viewing.
View AllClose
2. Mobile phone information push. The camera starts the alarm, the monitoring area has abnormal conditions, the camera automatically sends the alarm information to the mobile phone or the designated mailbox (the mobile phone alarm requires the software to run in the background of the mobile phone)
3. Wireless connection, get rid of the shackles of the network cable and the computer.
4. P2P network penetration, where there is a network, you can see every move at home.
5. Support two-way voice.
6. Support storage loop recording.
7. Support multi-user platform viewing.