3690 Device Lock Modification

3690 Device Lock Modification


This video will explain how to modify the lock on the 3690 Device.
Closed Caption:

we're going to use this model 3690
purple
show you how to change the sole owner in
our unit support within
Tercel underdog
these instructions would be the same
poor 3790 serious room where action it's
as well
this unit uses a standard room key so
perhaps you want to change the cylinder
out from the construction zone was
originally supplied on your job
to the one should be using them rushed
to the building or you wanna change
Saunders for security reasons the first
up was
is removing the device from the door
then you need to remove the push bar to
access
sewn to remove the push bar you'll need
to remove the lock style
and care then you'll have to disconnect
the darden bracket by removing the
attaching screws on the rear D
this allows the dog %um to slide off
with
push you'll find reference to these
instructions and other directions
and reference to our website located on
a sticker on the inside
style and cap ever said
we begin by removing the lock style and
cap screws
and and cat
once the end cap is off turn the device
over and remove the tour catching screws
holding the dog some these are the two
screws closest to the hands trial
and
once the dog mechanism is disconnected
you'll be able to slide the Pushkar of
the device
so carefully turning the unit back over
and with that in the underdog position
slowly slide the Pushkar
be sure to position the unit over work
surface
so that the dog mechanism is caught as
it comes out of the device
in this case the docking mechanism
statement channel will set it aside and
so we're ready to reattach the push for
later
we now have easy access to the so
Saunders held in position by retaining
plea as you can see in addition to the
lubricant
there's an indicator mark on the plea
removing this order screws
Lisa retaining plate lose in the channel
and this will help this park will help
relocated
after removing the Saunders you can pop
out the solingen
collar from the push for you do not have
to remove the retaining
plea from the push for you can leave it
in place for reinstallation
later you can now install your new so on
you can use most brands room types
owners
although this collar was designed for
Standard & Security Saunders
you need to check the depth of your so
honored to be sure it will fit without
interference inside unit
the retaining plate was designed with
slotted mounting holes to accommodate
most
greens please contact us if your brand
does not fit
place the new cylinder into the collar
and put them work into the push for be
sure to line up to so under with the
slots in the retaining bracket
and the contour of the collar
with that the push for then check the
length of the tail piece
you should be slightly below the edges
of the Pushkar
this tailpiece will need to be true
once the Saunders back in place replace
the mounting screws
Titan firmly but not overly tight
we want to avoid bending the retaining
bracket
you want to use the indicator markers a
starting point but the real key is to be
sure that no interference
exist between the cylinder hob and the
cut-out
in the retaining bracket after securing
the cylinder use the cylinder keys to
check the rotation
making sure that the soldier rotates
freely
and without any binding also
checked the underside of the collar to
be sure the contour
this setting flush to push bar once
Saunders installed we can assemble the
dog
mechanism by placing over the so under
tailpiece
be sure the spring screw
on the docking mechanism is pointed to
the hinge side at the push for
while holding the dog make
assembly against the push bar slide to
push far back into place
over the axles continue to hold the
docking mechanism into your sure
its inside the champ
finish sliding the Pushkar into place
then turned the device over
align the holes up the dog use only with
those in the channel mounting holes
Andrea K
tighten these attaching screws securely
the operation the device by working it
up and down to be sure there's no
interference
then turn the device back over and
reattach the lock style in cap
to secure the push are in place
check the
again and then checked this function
the so underdog
a quarter turn the key should dog to
unit
and the units state dog when the key is
removed a quarter turn in the other
direction
and the unit should under if all those
checks out
than the unit is ready for mounting back
onto the door

Video Length: 06:26
Uploaded By: firstchoicebuilding
View Count: 1,173

Related Software Products
DeviceLock
DeviceLock

Published By:
SmartLine Inc.

Description:
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, Bluetooth, ZIPs, etc.) on a local computer. Once DeviceLock is installed, administrators can control access to floppies, CD-ROMs, USB or any other device, depending on the time of day and day of the week. DeviceLock enhances access control for Windows System Administrators and helps control removable disk usage. ...


Related Videos
How to Unlock/Bypass Any iPhone or iOS Device Lock Screen (Skit/Spoof)
How to Unlock/Bypass Any iPhone or iOS Device Lock Screen (Skit/Spoof)

What's up everyone this is DesperateFun! I hope all of you guys are having a great day! At this point I think most of you know that this is a spoof video/prank. I made this video because I forgot my April Fools prank video. I really would like to apologize for not uploading for such a long time. BO3 has just been very disappointing and I haven't had much fun with it. I will now continue to upload and make sure that I keep a good schedule. I hope you guys enjoyed the video and peace! br ...
Video Length: 08:55
Uploaded By: DesperateFun Gaming
View Count: 16,055

In-Depth Demo -- DeviceLock 7.1 Endpoint DLP Suite software for data leak prevention
In-Depth Demo -- DeviceLock 7.1 Endpoint DLP Suite software for data leak prevention

View a detailed software demo of DeviceLock 7.1 endpoint DLP Data Leak Prevention Software. DeviceLock software enforces data privacy policies by monitoring for unauthorized handling of confidential data by end-users. The software prevents unauthorized network connections and data transfers; stops data from leaking out when employees are using cloud-based applications like email, Twitter, Facebook, Google+, Skype and more; and blocks the ability for anyone to copy confidential data from ...
Video Length: 55:40
Uploaded By: DeviceLockVideo
View Count: 2,246

DeviceLock - City Of London Police Interview
DeviceLock - City Of London Police Interview

Gary Brailsford, Hart Head of Information Services City of London Police. hr / bClosed Caption:/b do p.m. but officials position said 2003 we recognize that processing unit just security standpoint expected to price is connected to the infrastructure going from its a phone book to work forced him to miss you count feature shit stop thinking or more forget shit to manage it a number of questionsbr ...
Video Length: 02:05
Uploaded By: VidPR
View Count: 948

CEO DeviceLock Vincent Schiavo Interviewed on DLP Data Leak Prevention
CEO DeviceLock Vincent Schiavo Interviewed on DLP Data Leak Prevention

Understand what it means to stop data leaks - at the source. The CEO of DeviceLock is interviewed at the RSA Security Conference 2012 on DLP Data Leak Prevention. The DeviceLock endpoint security software solution is practical, affordable and easily managed from within Microsoft Active Directory. DeviceLock DLP software is used on over 4 million computers around the world today. hr / bClosed Caption:/b font color="#CCCCCC"my guess is Vinny skiable/fontfont ...
Video Length: 11:57
Uploaded By: DeviceLockVideo
View Count: 711

DeviceLock 7.0, prevenire la perdita di dati in azienda - TVtech
DeviceLock 7.0, prevenire la perdita di dati in azienda - TVtech

Intervista con Flavio Sangalli, responsabile di DeviceLock per l'Italia, che ci illustra le funzionalità della suite di sicurezza DeviceLock 7.0 Endpoint DLP, per prevenire la sottrazione dolosa o la perdita accidentale di dati all'interno di un'azienda, controllando i canali di comunicazione locali e di rete di ciascun PC
Video Length: 05:38
Uploaded By: TVtech.it
View Count: 627

DeviceLock By BorderLAN
DeviceLock By BorderLAN

DeviceLock by BorderLAN provides network administrators the ability to set and enforce contextual policies for how, when, where to, and by whom data can or can't be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. http://borderlan.com/data-loss-preven... hr / bClosed Caption:/b my name's Adrian speaker for device lock device lock is an independent softwarebr ...
Video Length: 28:08
Uploaded By: BorderLAN
View Count: 621

Android Device Lock removed
Android Device Lock removed

One of plenty posibilities to remove device security lock on Android. This Video is a proof of poor Software Quality of Big Security Software Companies.
Video Length: 01:06
Uploaded By: Mantux
View Count: 510

Websem Technique - DeviceLock 7
Websem Technique - DeviceLock 7

Présentation de la solution DeviceLock 7 et des modules addtionnels NetworkLock et ContentLock. Fonctions abordées : - Console d'administration - Gestion des politiques de sécurité - Modules NetworkLock et ContentLock
Video Length: 44:52
Uploaded By: ATHENA Global Services
View Count: 336

DLP in a BYOD world.  Interview w. DeviceLock CEO, Vince Schiavo
DLP in a BYOD world. Interview w. DeviceLock CEO, Vince Schiavo

In this interview by TMC Vince Schiavo, DeviceLock CEO discusses the importance of data leak prevention software in the BYOD and cloud enabled enterprise. DLP is becoming much more important as employees bring mobile devices into the workplace, allowing them to move data easily from the trusted corporate network out into the wild. hr / bClosed Caption:/b the American tasked with EMC's roadshow we are here in San Jose Calif this week and i'm talking ...
Video Length: 06:03
Uploaded By: DeviceLockVideo
View Count: 288

Copyright © 2025, Ivertech. All rights reserved.