Safes
   HOME
*



picture info

Safes
A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft or fire. A safe is usually a hollow cuboid or cylinder, with one face being removable or hinged to form a door. The body and door may be cast from metal (such as steel) or formed out of plastic through blow molding. Bank teller safes typically are secured to the counter, have a slit opening for dropping valuables into the safe without opening it, and a time-delay combination lock to foil thieves. One significant distinction between types of safes is whether the safe is secured to a wall or structure or if it can be moved around. A less secure version (only suitable for petty cash) is usually called a cash-box. History The first known safe dates back to the 13th century BC and was found in the tomb of Pharaoh Ramesses II. It was made of wood and consisted of a locking system resembling the modern pin tumbler lock. In the 16th century, blacksmiths in south ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Safe
A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft or fire. A safe is usually a hollow cuboid or cylinder, with one face being removable or hinged to form a door. The body and door may be cast from metal (such as steel) or formed out of plastic through blow molding. Bank teller safes typically are secured to the counter, have a slit opening for dropping valuables into the safe without opening it, and a time-delay combination lock to foil thieves. One significant distinction between types of safes is whether the safe is secured to a wall or structure or if it can be moved around. A less secure version (only suitable for petty cash) is usually called a cash-box. History The first known safe dates back to the 13th century BC and was found in the tomb of Pharaoh Ramesses II. It was made of wood and consisted of a locking system resembling the modern pin tumbler lock. In the 16th century, blacksmiths in souther ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Safe-cracking
Safe-cracking is the process of opening a safe without either the combination or the key. Physical methods Different procedures may be used to crack a safe, depending on its construction. Different procedures are required to open different safes, so safe-crackers need to be aware of the differences. Lock manipulation Lock manipulation is a damage-free combination recovery method and a well known surreptitious bypass technique. Manipulation only requires fingers, eyes, and proper technique, though it is a skill that takes years to develop. While manipulation of combination locks is usually performed on Group 2 locks, many Group 1 locks are susceptible to manipulation. It involves the manipulation of the lock in order to obtain the combination one number at a time. Manipulation procedures can vary, but they all rely on exploiting the presence of mechanical imperfections in the lock, unlocking the safe and recovering its combination, which can then be reused to open the safe lock ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Charles Chubb (businessman)
Charles Chubb (1779 – 1846) was an English lock and safe manufacturer. Life Born in Fordingbridge, Hampshire, he trained as a blacksmith who started a hardware business at Winchester then moved to Portsea, Portsmouth. Here he improved on the "detector" lock, originally patented in 1818 by his brother, Jeremiah Chubb. He soon moved to London and then to Wolverhampton, where he employed 200 workers. In 1835, he patented a process intended to render safes burglar-proof and fireproof, and subsequently established a large safe-factory in London. He died on 16 May 1846, and was succeeded in the business by his son, John Chubb (1816–1872), who patented various improvements in the products of the firm and largely increased its output. The factories were combined under one roof in a model plant and the business grew to enormous proportions, now Chubb Locks. Charles Chubb was buried on the 22 May 1846 in the western side of Highgate Cemetery. His plot (no.1847) is in the dissent ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Diversion Safe
Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is that such an inconspicuous object would not be expected to contain anything of worth. Examples in espionage include dead drop spikes for transferring items to other people, and hollowed-out coins or hollowed out teeth for concealing something - such as microfilm or a suicide pill. Examples in smuggling include suitcases with false bottoms for hiding contraband. During World War II MI9 was responsible for creating many concealment devices for "escape aids" to assist prisoners of war to escape. Examples Ammunition Starting in the First World War and still continuing today, military personnel use ammunition casings to hide small amounts of critical information e.g. encryption/recognition codes or navigational grid references etc. The hidi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Jeremiah Chubb
A Chubb detector lock is a lever tumbler lock with an integral security feature, a re-locking device, which frustrates unauthorised access attempts and indicates to the lock's owner that it has been interfered with. When someone tries to pick the lock or to open it using the wrong key, the lock is designed to jam in a locked state until (depending on the lock) either a special regulator key or the original key is inserted and turned in a different direction. This alerts the owner to the fact that the lock has been tampered with. Any person who attempts to pick a detector lock must avoid triggering the automatic jamming mechanism. If the automatic jamming mechanism is accidentally triggered (which happens when any one of the levers is lifted too high) the lock-picker has the additional problem of resetting the detector mechanism before the next attempt to open the lock. This introduces additional complexity into the task, increasing the degree of lock-picking skill required to a le ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hinge
A hinge is a mechanical bearing that connects two solid objects, typically allowing only a limited angle of rotation between them. Two objects connected by an ideal hinge rotate relative to each other about a fixed axis of rotation: all other Translation (geometry), translations or rotations being prevented, and thus a hinge has one degree of freedom. Hinges may be made of Flexure bearing, flexible material or of moving components. In biology, many joints function as hinges, like the elbow joint. History Ancient remains of stone, marble, wood, and bronze hinges have been found. Some date back to at least Ancient Egypt. In Ancient Rome, hinges were called wikt:cardo#Latin, cardō and gave name to the goddess Cardea and the main street Cardo. This name cardō lives on figuratively today as "the chief thing (on which something turns or depends)" in words such as ''wikt:cardinal#English, cardinal''. According to the OED, the English word hinge is related to ''wikt:hang#English, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Assa Abloy
Assa Abloy AB is a Swedish conglomerate whose offerings include products and services related to locks, doors, gates, and entrance automation. Related products and services include controlling access and confirming identities with keys, cards, tags, mobile, and bio-metric identity verification systems. The company was formed in 1994, when Assa AB was separated from Swedish security firm Securitas AB. Shortly thereafter, Assa AB merged with the Finnish high security lock manufacturer Abloy Oy (based in Joensuu, a subsidiary of the Finnish company Wärtsilä). The company was introduced to the Stockholm Stock Exchange later the same year. Assa Abloy has since made over 200 acquisitions including Yale lock, Chubb Locks, Medeco in the United States, Mul-T-Lock in Israel and Fichet-Bauche in France. Its two largest shareholders are Latour and Melker Schörling AB. Name Assa Abloy was founded at the merger of the two companies Assa and Abloy in 1994. Assa stands for August Stenman ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Security Through Obscurity
Security through obscurity (or security by obscurity) is the reliance in security engineering on design or implementation secrecy as the main method of providing security to a system or component. History An early opponent of security through obscurity was the locksmith Alfred Charles Hobbs, who in 1851 demonstrated to the public how state-of-the-art locks could be picked. In response to concerns that exposing security flaws in the design of locks could make them more vulnerable to criminals, he said: "Rogues are very keen in their profession, and know already much more than we can teach them." There is scant formal literature on the issue of security through obscurity. Books on security engineering cite Kerckhoffs' doctrine from 1883, if they cite anything at all. For example, in a discussion about secrecy and openness in Nuclear Command and Control: e benefits of reducing the likelihood of an accidental war were considered to outweigh the possible benefits of secrecy. This ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Lock (security Device)
A lock is a mechanical or electronic fastening device that is released by a physical object (such as a key, keycard, fingerprint, RFID card, security token or coin), by supplying secret information (such as a number or letter permutation or password), by a combination thereof, or it may only be able to be opened from one side, such as a door chain. A key is a device that is used to operate a lock (to lock or unlock it). A typical key is a small piece of metal consisting of two parts: the ''bit'' or ''blade'', which slides into the keyway of the lock and distinguishes between different keys, and the ''bow'', which is left protruding so that torque can be applied by the user. In its simplest implementation, a key operates one lock or set of locks that are keyed alike, a lock/key system where each similarly keyed lock requires the same, unique key. The key serves as a security token for access to the locked area; locks are meant to only allow persons having the correct key to ope ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Heist Film
The heist film or caper film is a subgenre of crime film focused on the planning, execution, and aftermath of a significant robbery. One of the early defining heist films was ''The Asphalt Jungle'' (1950), which ''Film Genre 2000'' wrote "almost single-handedly popularized the genre for mainstream cinema". It featured robbers whose personal failings ultimately led to the failure of their robbery. Similar films using this formula were ''Armored Car Robbery'' (1950), '' The Killing'' (1956), and '' The Getaway'' (1972). By the 1990s, heist films began to "experiment and play with these conventions," incorporating things like comedy into heist stories. Characteristics of the genre While there is sometimes some confusion as to what counts as a heist film, there are characteristics that most films in the genre follow. The most basic of these is that films in the genre tend to follow the planning, execution and aftermath of one large robbery. While there can be smaller crimes lead ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Theft
Theft is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word ''theft'' is also used as a synonym or informal shorthand term for some crimes against property, such as larceny, robbery, embezzlement, extortion, blackmail, or receiving stolen property. In some jurisdictions, ''theft'' is considered to be synonymous with ''larceny'', while in others, ''theft'' is defined more narrowly. Someone who carries out an act of theft may be described as a "thief" ( : thieves). ''Theft'' is the name of a statutory offence in California, Canada, England and Wales, Hong Kong, Northern Ireland, the Republic of Ireland, and the Australian states of South Australia Theft (and receiving). and Victoria. Theft. Elements The '' actus reus'' of theft is usually defined as an unauthorized taking, keeping, or using of another's property which must be accompanied by a '' mens rea'' of dish ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Key (lock)
A lock is a mechanics, mechanical or Electronics, electronic fastening device that is released by a physical object (such as a key, Keycard lock, keycard, fingerprint, Radio-frequency identification, RFID card, security token or coin), by supplying secret information (such as a number or letter permutation or password), by a combination thereof, or it may only be able to be opened from one side, such as a door chain. A key is a device that is used to operate a lock (to lock or unlock it). A typical key is a small piece of metal consisting of two parts: the ''Bit (key), bit'' or ''blade'', which slides into the keyhole, keyway of the lock and distinguishes between different keys, and the ''bow'', which is left protruding so that torque can be applied by the user. In its simplest implementation, a key operates one lock or set of locks that are keyed alike, a lock/key system where each similarly keyed lock requires the same, unique key. The key serves as a security token for access ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]