Summary
In this chapter, there was very little hardware work to do, but on the other hand, we discovered how to use a really powerful tool named motion
. This tool allows us to realize (quasi) professional, if minimal, anti-intrusion system. Also, you learned how to send simple e-mails with attached pictures to inform the user about an important event in the system.
In the next chapter, we'll discover how to use different identification devices (such as RFID readers and smart card readers) to implement an access control system.