cris magno
  • NEW!
    NEW!  Connect Ideas Across Notes
    Save time and share insights. With Paragraph Citation, you can quote others’ work with source info built in. If someone cites your note, you’ll see a card showing where it’s used—bringing notes closer together.
    Got it
      • Create new note
      • Create a note from template
        • Sharing URL Link copied
        • /edit
        • View mode
          • Edit mode
          • View mode
          • Book mode
          • Slide mode
          Edit mode View mode Book mode Slide mode
        • Customize slides
        • Note Permission
        • Read
          • Only me
          • Signed-in users
          • Everyone
          Only me Signed-in users Everyone
        • Write
          • Only me
          • Signed-in users
          • Everyone
          Only me Signed-in users Everyone
        • Engagement control Commenting, Suggest edit, Emoji Reply
      • Invite by email
        Invitee

        This note has no invitees

      • Publish Note

        Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note No publishing access yet

        Your note will be visible on your profile and discoverable by anyone.
        Your note is now live.
        This note is visible on your profile and discoverable online.
        Everyone on the web can find and read all notes of this public team.

        Your account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

        Your team account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

        Explore these features while you wait
        Complete general settings
        Bookmark and like published notes
        Write a few more notes
        Complete general settings
        Write a few more notes
        See published notes
        Unpublish note
        Please check the box to agree to the Community Guidelines.
        View profile
      • Commenting
        Permission
        Disabled Forbidden Owners Signed-in users Everyone
      • Enable
      • Permission
        • Forbidden
        • Owners
        • Signed-in users
        • Everyone
      • Suggest edit
        Permission
        Disabled Forbidden Owners Signed-in users Everyone
      • Enable
      • Permission
        • Forbidden
        • Owners
        • Signed-in users
      • Emoji Reply
      • Enable
      • Versions and GitHub Sync
      • Note settings
      • Note Insights New
      • Engagement control
      • Make a copy
      • Transfer ownership
      • Delete this note
      • Save as template
      • Insert from template
      • Import from
        • Dropbox
        • Google Drive
        • Gist
        • Clipboard
      • Export to
        • Dropbox
        • Google Drive
        • Gist
      • Download
        • Markdown
        • HTML
        • Raw HTML
    Menu Note settings Note Insights Versions and GitHub Sync Sharing URL Create Help
    Create Create new note Create a note from template
    Menu
    Options
    Engagement control Make a copy Transfer ownership Delete this note
    Import from
    Dropbox Google Drive Gist Clipboard
    Export to
    Dropbox Google Drive Gist
    Download
    Markdown HTML Raw HTML
    Back
    Sharing URL Link copied
    /edit
    View mode
    • Edit mode
    • View mode
    • Book mode
    • Slide mode
    Edit mode View mode Book mode Slide mode
    Customize slides
    Note Permission
    Read
    Only me
    • Only me
    • Signed-in users
    • Everyone
    Only me Signed-in users Everyone
    Write
    Only me
    • Only me
    • Signed-in users
    • Everyone
    Only me Signed-in users Everyone
    Engagement control Commenting, Suggest edit, Emoji Reply
  • Invite by email
    Invitee

    This note has no invitees

  • Publish Note

    Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note No publishing access yet

    Your note will be visible on your profile and discoverable by anyone.
    Your note is now live.
    This note is visible on your profile and discoverable online.
    Everyone on the web can find and read all notes of this public team.

    Your account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

    Your team account was recently created. Publishing will be available soon, allowing you to share notes on your public page and in search results.

    Explore these features while you wait
    Complete general settings
    Bookmark and like published notes
    Write a few more notes
    Complete general settings
    Write a few more notes
    See published notes
    Unpublish note
    Please check the box to agree to the Community Guidelines.
    View profile
    Engagement control
    Commenting
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Suggest edit
    Permission
    Disabled Forbidden Owners Signed-in users Everyone
    Enable
    Permission
    • Forbidden
    • Owners
    • Signed-in users
    Emoji Reply
    Enable
    Import from Dropbox Google Drive Gist Clipboard
       Owned this note    Owned this note      
    Published Linked with GitHub
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    # Common Mistakes Auckland Businesses Make with Access Control Systems You've just invested thousands in a shiny new access control system for your Auckland business. The installer's gone, the swipe cards are distributed, and you're feeling pretty good about your security upgrade. Then, three months later, you're manually unlocking doors because half your team forgot their cards, your system's crashed twice, and you've got no idea who entered the building last Tuesday when equipment went missing. Sound familiar? You're not alone. Key Takeaways: Q: What's the biggest mistake businesses make with access control? A: Choosing systems based solely on price rather than scalability and integration needs. Q: How often should access permissions be reviewed? A: At minimum quarterly, though monthly reviews are ideal for high-turnover businesses. Q: Can outdated access control systems be hacked? A: Yes – systems without regular updates and older proximity card technology are particularly vulnerable. Q: What's the hidden cost of poor access control? A: Beyond security breaches, businesses lose an average of 8-12 hours monthly on manual workarounds and administrative headaches. Walk into Bernie Woods' workshop at The Security Company's Vega Place headquarters in Rosedale, and you'll hear stories. Twenty-seven years in Auckland's security industry means Bernie and his team have seen every access control mistake imaginable – and fixed most of them twice. "The phone call usually starts the same way," Bernie says, leaning against a workbench scattered with card readers and control panels. "'We installed this system ourselves' or 'We went with the cheapest quote' and now they're locked out of their own building at 6 AM with staff arriving in twenty minutes." The access control market in Auckland has exploded since The Security Company opened its doors in 1997. What used to be simple lock-and-key operations have transformed into sophisticated systems managing everything from carpark barriers to server room restrictions. Yet despite technological advances, businesses across Auckland and the North Shore keep making the same fundamental errors – mistakes that cost them not just money, but actual security. Mistake #1: Treating Access Control as a "Set and Forget" Purchase Here's the thing about security systems – they're living, breathing parts of your business infrastructure. They need attention, updates, and regular maintenance just like your accounting software or coffee machine. Yet this remains the most common oversight Bernie's team encounters. Picture this: A commercial property management firm in Albany installed an access control system in 2018. Brilliant start. They set up access levels, distributed cards, and felt secure. Fast forward to 2024, and they're still running the original firmware. Three staff members who left in 2020 still have active credentials in the system. The software hasn't been updated, meaning it's vulnerable to known exploits that hackers have been sharing online for years. "We see this constantly," explains one of The Security Company's senior technicians. "Businesses install these systems, get them working, then completely forget about them. Meanwhile, employees come and go, security threats evolve, and that forgotten system becomes the weakest link in your security chain." The reality? Your access control system needs quarterly reviews at minimum. Every time someone leaves your company, their access should be revoked immediately – not next week, not when someone remembers. When new security patches are released, they should be installed. When your business layout changes, your access zones should be reconfigured. Action step: Schedule recurring calendar reminders for access audits. Create a standardized offboarding checklist that includes immediate access revocation. Partner with a security company that offers regular maintenance contracts rather than one-off installations. Mistake #2: Choosing Systems That Don't Scale with Your Business You're running a small Auckland startup with eight employees. You need basic access control – something simple and affordable. So you buy a standalone system that handles one door and basic card reading. Perfect for today. But what about tomorrow? Eighteen months later, you've expanded to fifteen staff, opened a second floor, and need to secure your server room separately. Suddenly, that "affordable" system can't handle multiple zones, doesn't integrate with your new CCTV cameras, and can't provide the detailed reporting your insurance company now requires. You're facing a complete system replacement instead of a simple expansion. This scenario plays out across Auckland business parks weekly. Companies plan for their current needs without considering future growth, acquisitions, or changing security requirements. The result? They end up paying for access control systems twice – once for the initial install and again for the replacement. ICT access control systems, which The Security Company specializes in, offer modular scalability. You can start with basic door access and expand to include intercom systems, integration with CCTV Auckland networks, time-and-attendance tracking, and even integration with building management systems. The key is choosing architecture that allows growth without replacement. "We always ask clients about their five-year plan," Bernie notes. "Are you hiring? Expanding premises? Planning multiple locations? These aren't just business questions – they're security planning fundamentals." Action step: Before purchasing any access control system, map out your three-to-five-year business trajectory. Choose systems with proven scalability and integration capabilities, even if they cost slightly more upfront. Mistake #3: Ignoring Integration Opportunities Your access control system should talk to your other security infrastructure. It's 2025, not 1995. Yet countless Auckland businesses operate security systems in complete isolation – access control that doesn't communicate with alarm systems, CCTV that can't verify who triggered an alert, and monitoring services that can't distinguish between authorized after-hours access and potential break-ins. Here's a real example: A North Shore manufacturing business had a commercial alarm system, surveillance cameras Auckland-based, and a perfectly functional access control setup. All three systems were installed by different companies at different times. None communicated with each other. One Friday evening, an employee returned to collect forgotten tools. Their valid access card opened the door but also triggered the alarm system (which nobody had synchronized with the access control). The monitoring service saw an alarm activation with no context. Security was dispatched. The employee was confronted by guards while innocently grabbing their toolbox. The whole situation created embarrassment, unnecessary costs, and a very unhappy staff member. Integrated security means your access control system tells your alarm it's authorized access. It triggers specific CCTV cameras to record. It logs the event with timestamps that match across all systems. When something goes wrong, you have a complete picture rather than disconnected fragments. Modern access control solutions should integrate seamlessly with: • Commercial alarm systems and house security systems • CCTV cameras Auckland suppliers provide • Alarm monitoring services • Time-and-attendance software • Building management systems • Mobile apps for remote management The Security Company's approach involves comprehensive security assessments that identify integration opportunities before installation begins. "We look at the entire security ecosystem," Bernie explains. "What's already in place? What's planned? How can we make everything work together rather than against each other?" Action step: Audit your current security infrastructure. Request demonstrations of integrated systems. Ask potential installers specifically how their access control solution will communicate with your existing alarm systems, CCTV, and monitoring services. Mistake #4: Overlooking User Experience and Training You've installed an advanced access control system with biometric readers, multi-factor authentication, and sophisticated zone management. It's Fort Knox-level security. There's just one problem – your staff hate it and actively try to circumvent it. Security systems that frustrate legitimate users inevitably get defeated. Employees prop doors open. They share access cards. They write PIN codes on sticky notes attached to their monitors. The more complex and user-unfriendly your system, the more creative your staff become at bypassing it. A Takapuna retail business learned this lesson expensively. They installed a system requiring both card swipe and PIN entry for all doors. Noble intention – two-factor security. Practical reality? Staff members started propping open the back door with a fire extinguisher because re-entering their PIN every time they stepped out for fresh air was unbearable. The sophisticated access control system was defeated by a fire extinguisher and basic human nature. Balance is essential. Your system should be secure enough to protect assets but friendly enough that staff use it willingly. This means: • Intuitive interfaces that don't require engineering degrees • Appropriate security levels for different zones (the break room doesn't need biometric scanning) • Mobile credentials that integrate with devices people already carry • Clear visual feedback when access is granted or denied • Proper training during onboarding and when systems update The Security Company includes user training as standard with all installations. "Technology is only as good as the people using it," one technician explains. "We walk teams through the system, answer questions, and follow up after a few weeks to address any friction points. A fifteen-minute training session prevents months of headaches." Action step: Survey your staff about current access pain points. Design security appropriate to actual risk levels. Schedule proper training sessions – not just quick demonstrations. Create simple reference guides for common tasks and troubleshooting. Mistake #5: Neglecting Cybersecurity for Physical Access Systems Here's an uncomfortable truth: Your access control system is a computer network. If it connects to your Wi-Fi or integrates with cloud services, it's vulnerable to exactly the same cyber threats as your email servers and customer databases. Yet businesses consistently overlook this reality. Auckland business owners often think about security in physical terms – doors, locks, cards, alarms. They implement robust cybersecurity for their IT infrastructure while leaving their access control system with default admin passwords, outdated firmware, and zero network segmentation. Sophisticated attackers don't need to pick locks anymore. They can potentially: • Exploit unpatched vulnerabilities to grant themselves access credentials • Intercept older RFID card signals and clone them • Access control systems through compromised networks • Manipulate logs to hide their presence A professional services firm in Auckland's CBD discovered this when their IT audit revealed their access control panel was accessible from the public internet with credentials that hadn't changed since installation. Any moderately skilled attacker could have unlocked every door in their building from a laptop in a café across the street. Cybersecurity for physical access control means: • Changing default passwords immediately upon installation • Regular firmware and software updates • Network segmentation keeping access control separate from general business networks • Encrypted communications between system components • Regular security audits by professionals who understand both physical and cyber security • Modern credential technology (newer smart cards versus easily-cloned older proximity cards) "The convergence of physical and cyber security is something many businesses still don't grasp," Bernie observes. "We partner with IT professionals to ensure our installations meet both physical security standards and cybersecurity best practices. Your access control system needs the same protection as your financial data." Action step: Conduct a cybersecurity audit specifically focused on your access control infrastructure. Ensure systems are network-segmented and regularly updated. Consider upgrading from older proximity card technology to more secure alternatives. Mistake #6: Failing to Consider Emergency and Compliance Requirements Three AM. Fire alarm sounds. Your sophisticated access control system has every door locked with magnetic locks requiring power to release. Power's cut in the building. Two hundred office workers are trapped inside because nobody considered fail-safe versus fail-secure configurations during installation. This scenario, while dramatic, highlights a critical mistake: failing to properly plan for emergencies and regulatory compliance. New Zealand has specific requirements around emergency egress, fire safety, and building codes that your access control system absolutely must comply with. Auckland Council and fire safety regulations require that certain doors must unlock automatically during fire alarms or power failures. Other areas – like pharmaceutical storage or data centers – might require the opposite: failing secure even during emergencies. Getting this wrong isn't just inconvenient; it's potentially illegal and definitely dangerous. Beyond emergencies, businesses often overlook: • Privacy Act requirements around access data collection and storage • Health and Safety regulations requiring specific access logging • Insurance policy stipulations about security system specifications • Industry-specific compliance (healthcare, finance, childcare each have unique requirements) • Lease agreements requiring certain access control standards A medical clinic in Browns Bay faced an insurance claim denial after a break-in because their access control system didn't meet the logging requirements specified in their policy. They had a system; it just wasn't the right system for their insurance coverage. That oversight cost them tens of thousands of dollars. The Security Company's free assessment process specifically addresses compliance requirements. "We ask about your industry, your insurance, your specific risks," Bernie explains. "A childcare center has completely different requirements than a warehouse. Cookie-cutter solutions don't work." Action step: Review your insurance policies, lease agreements, and industry regulations before selecting access control systems. Ensure your installer understands New Zealand building codes and fire safety requirements. Document everything for future audits and insurance purposes. Mistake #7: Choosing Installers Based Only on Price The cheapest quote isn't always the best deal. In fact, in the security industry, it's rarely the best deal. Bernie's team regularly gets calls from businesses facing access control disasters. "We need help fixing this system" is usually code for "We hired the cheapest installer we could find and now we're paying for it." Sometimes literally – they're paying The Security Company to completely reinstall systems that were improperly configured the first time. Quality installation involves: • Proper site assessment before quoting • Understanding your specific business needs and risks • Appropriate system recommendations (not just what the installer has in their van) • Professional installation with attention to cable routing, panel placement, and aesthetics • Thorough testing and commissioning • Comprehensive user training • Ongoing support and maintenance • No long-term contracts locking you into poor service *[The Security Company](https://securityco.co.nz/)*, established in 1997 and further expanded through the 2014 acquisition of Hawk Security Alarms, operates without long-term contracts. "If we're doing our job properly, you'll stay with us because we provide excellent service, not because you're contractually trapped," Bernie states. "That philosophy has kept us successful for nearly three decades." Beware of installers who: • Quote without visiting your site • Offer prices dramatically below competitors • Push specific brands without explaining why • Don't ask detailed questions about your business • Can't provide local references • Aren't clear about ongoing support and costs Action step: Get at least three quotes, but evaluate based on total value, not just price. Ask for references and actually call them. Verify credentials and experience with systems similar to your requirements. Choose installers who ask insightful questions about your business. ## Getting Access Control Right: A Practical Framework After reading about all these mistakes, you might feel overwhelmed. Access control doesn't have to be complicated when approached systematically. Here's the framework The Security Company uses with Auckland businesses: Assessment Phase: Start with a comprehensive security assessment. What are you actually protecting? What are the realistic threats? Who needs access to what, and when? How might your business change in coming years? Planning Phase: Design your access control architecture around business processes, not just doors. Map user groups, access levels, integration requirements, and emergency procedures. Plan for growth and change. Selection Phase: Choose scalable, integrable systems from reputable brands. The Security Company works with DSC Alarms, ICT Access Control, and Hikvision Security Cameras – established brands with proven reliability and support networks. Installation Phase: Professional installation by experienced technicians who understand both the technology and your business requirements. Proper documentation of the entire system for future reference. Training Phase: Comprehensive user training for staff and administrators. Clear procedures for common tasks and troubleshooting. Maintenance Phase: Regular audits, updates, and system optimization. Quarterly access reviews. Prompt response to issues. Ongoing relationship with your security provider. This approach prevents most common mistakes before they happen. It's not the fastest approach, and it's not the cheapest upfront. But it's the approach that ensures your access control system actually secures your business while supporting your operations rather than hindering them. ## The True Cost of Access Control Mistakes Let's talk numbers. A properly specified and installed access control system for a typical small Auckland business might cost $5,000-$15,000 depending on complexity. That seems expensive until you consider the costs of getting it wrong: • Security breaches: Average cost of a small business security incident in NZ ranges from $10,000-$50,000+ in stolen property, remediation, downtime, and reputational damage • Complete system replacement: When businesses choose wrong systems, replacement costs often double the initial investment • Lost productivity: Staff wasting time on access issues, manual workarounds, and security-related interruptions • Insurance implications: Higher premiums or denied claims due to inadequate security • Compliance fines: Regulatory penalties for failing to meet required standards • Opportunity costs: Time spent managing poorly functioning systems rather than growing your business A North Shore property management company recently shared their numbers with The Security Company. Their initial "budget" access control system cost $8,000. Over three years, they spent an additional $4,500 on workarounds, fixes, and extra CCTV cameras to compensate for system limitations. When they finally replaced it with an appropriate system, the project cost $18,000. Total outlay: $30,500 for what should have been a $15,000 project done right the first time. ## Frequently Asked Questions Q: How do I know if my current access control system is outdated or vulnerable? A: Key warning signs include: inability to integrate with modern systems, ongoing reliability issues, use of older proximity card technology (easily cloned), lack of mobile app support, difficult user management, or systems more than 7-10 years old without updates. The Security Company offers free assessments to evaluate existing systems and identify vulnerabilities. Contact them at 09 478 8567 or contact@securityco.co.nz to schedule a review. Q: What's the difference between access control systems for commercial versus residential use? A: While underlying technology is similar, commercial systems typically need to manage many more users, integrate with business systems, provide detailed reporting for compliance, handle complex access schedules, and scale across multiple locations. Residential systems like home intercom systems NZ homeowners use prioritize simplicity, aesthetic integration, and family-friendly operation. However, the same fundamental principles of proper planning, installation, and maintenance apply to both. Q: Can I upgrade my existing access control system without complete replacement? A: Often yes, especially with modular systems. Modern controllers can sometimes work with existing wiring and hardware while adding new capabilities through software updates or additional components. A proper assessment by experienced technicians like those at The Security Company can identify upgrade paths that provide better security and functionality without starting from scratch. However, some older proprietary systems may be impossible to upgrade cost-effectively. Q: How important is it that my access control integrates with CCTV and alarm systems? A: Integration is increasingly essential for effective security. When access control, CCTV cameras Auckland installers provide, and *[alarm monitoring services](https://securityco.co.nz/alarm-monitoring-auckland/)* work together, you get complete situational awareness. Your system can automatically record video when specific doors open, distinguish between authorized and unauthorized access, provide investigation capabilities after incidents, and reduce false alarms. While standalone systems can work, integrated approaches provide dramatically better security and operational efficiency. Q: What ongoing costs should I budget for after installation? A: Beyond the initial installation, plan for regular maintenance visits (typically $200-$500 annually), software updates, potential hardware replacements after 7-10 years, and occasional system expansions as your business grows. Many Auckland security companies, including The Security Company, offer maintenance packages that include regular servicing, priority support, and discounted repairs. These packages typically cost less than paying for emergency service calls when systems fail. ## Moving Forward: Your Access Control Action Plan You've now got a clear picture of the pitfalls Auckland businesses face with access control systems. The question is: what next? If you're planning a new installation, you're in the best position – you can avoid these mistakes entirely by working with experienced professionals who understand both technology and business needs. The Security Company's free assessment service provides an excellent starting point. Their team will visit your site, understand your specific requirements, and design solutions that actually fit your business rather than forcing your business to fit pre-packaged solutions. If you're struggling with an existing system, don't just live with frustration and security gaps. Schedule an assessment to identify what's wrong and what's possible. Sometimes simple adjustments or targeted upgrades can transform a problematic system into an effective one. Other times, replacement makes more sense – but at least you'll make that decision based on professional analysis rather than ongoing frustration. The cost of inaction is real. Every day you operate with inadequate access control is a day your business, your assets, and your people face unnecessary risk. Every hour your staff spend working around poorly functioning systems is wasted productivity. Every security incident that could have been prevented is an avoidable cost. ## Ready to Get Your Access Control Right? The Security Company has spent nearly three decades helping Auckland and North Shore businesses implement security solutions that actually work. From their Vega Place workshop in Rosedale, Bernie Woods and his team combine technical expertise with practical business understanding. They'll never push you toward systems you don't need. They won't lock you into long-term contracts. They will provide honest assessments, quality installations, and ongoing support that keeps your security infrastructure functioning properly year after year. Get started today: • Phone: 09 478 8567 • Email: contact@securityco.co.nz • Visit: 7b Vega Place, Rosedale, Auckland 0632 • Website: https://securityco.co.nz/ Schedule your free security assessment and discover how proper access control can enhance security while simplifying operations. Whether you need basic door access or sophisticated integrated systems spanning multiple locations, The Security Company has the experience and expertise to deliver solutions that work. Don't let your business become another cautionary tale. Avoid these common access control mistakes, partner with experienced professionals, and invest in security infrastructure that protects your business today while supporting growth tomorrow. Your security is too important to leave to chance. Contact The Security Company and experience what nearly three decades of Auckland security expertise looks like in practice.

    Import from clipboard

    Paste your markdown or webpage here...

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lose their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template has been removed or transferred.
    Upgrade
    All
    • All
    • Team
    No template.

    Create a template

    Upgrade

    Delete template

    Do you really want to delete this template?
    Turn this template into a regular note and keep its content, versions, and comments.

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password
    or
    Sign in via Google Sign in via Facebook Sign in via X(Twitter) Sign in via GitHub Sign in via Dropbox Sign in with Wallet
    Wallet ( )
    Connect another wallet

    New to HackMD? Sign up

    By signing in, you agree to our terms of service.

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Help & Tutorial

    How to use Book mode

    Slide Example

    API Docs

    Edit in VSCode

    Install browser extension

    Contacts

    Feedback

    Discord

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions and GitHub Sync
    Get Full History Access

    • Edit version name
    • Delete

    revision author avatar     named on  

    More Less

    Note content is identical to the latest version.
    Compare
      Choose a version
      No search result
      Version not found
    Sign in to link this note to GitHub
    Learn more
    This note is not linked with GitHub
     

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub
        • Please sign in to GitHub and install the HackMD app on your GitHub repo.
        • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
        Learn more  Sign in to GitHub

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Include title and tags
        Available push count

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully