OptusNET Wireless High Speed Internet

We are the leader in delivering innovative communications, information and entertainment. We offer voice, data and video products and services over intelligent wireless, broadband and global IP networks that meet customers growing demand for speed, mobility, security and control. As a committed corporate citizen, we use our advanced communications services to address important issues confronting our society.

Businesses under-reporting cyber attacks

Businesses are underestimating the importance of cyber security with 28% of cyber attacks being reported to the police, according to research by the Institute of Directors (IoD). A survey of 1000 businesses found that 49% have experienced damage and interruptions to...

EdgeMAX – Set up L2TP over IPsec VPN server

Interface and NAT Configuration To configure the allowed networks and NAT traversal on an interface, use the following commands: set vpn ipsec ipsec-interfaces interface eth0 set vpn ipsec nat-networks allowed-network 10.0.0.0/8 set vpn ipsec nat-networks...

EdgeMAX – Web proxy service for filtering

How the web proxy service can be configured via EdgeRouter’s CLI? A web proxy is useful for blocking, allowing or redirecting web traffic. There are a number of options associated with the web proxy service: hg@optusnet# set service webproxy ? administrator...

The 5 Key Aspects of a Top Trading Computer

Our expertise in multi-screen computer systems means that we serve customers in a few different markets however our largest sector has to be the trading / financial area. We have supplied specialist trading computers for over 4 years now and have spoken with hundreds...

What You Need to Know About Multi Monitor Graphics Cards

The Short Version The best way to achieve a stable and silent multi-screen computer which can survive a dying graphics card is to use multiple, passively cooled, dual monitor graphics cards. Most non-gaming quad monitor graphics cards perform poorly and are expensive,...

MySQL Database User: Which Privileges are needed?

For normal WordPress operations, such as posting blog posts, uploading media files, posting comments, creating new WordPress users and installing WordPress plugins, the MySQL database user only needs data read and data write privileges to the MySQL database; SELECT,...

Securing WordPress

Security in WordPress is taken very seriously, but as with any other system there are potential security issues that may arise if some basic security precautions aren’t taken. This article will go through some common forms of vulnerabilities, and the things you...

EdgeMAX dhcp-server configuration

After setup DHCP servers in the network you may discover problem with a slow response from DHCP server. This is very common problem when the network use a segmentation. Usually each of VLAN required own DHCP server. To correct this problem you should...

UniFi – Install controller software on CentOS

How to install UniFi controller on CentOS, a very stable Linux platform used on production servers. Prepare CentOS # yum update -y # reboot # yum -y install wget unzip php httpd # service httpd start # chkconfig httpd on # su root MongoDB # vi...

Unix/Linux command reference

File Commands ls – directory listing ls -al – formatted listing with hidden files cd dir – change directory to dir cd – change to home pwd – show current directory mkdir dir – create a directory dir rm file – delete file rm -r dir – delete directory dir rm -f...

Ten Ways to Protect Your IT Infrastructure

Reduce Costs while protecting critical business systems. If you have wondered how to provide serious protections on a small-business budget, this article is for you. Learn about power, cooling and security issues that put your IT systems at risk. Find out how to...

EdgeMAX – L2TP Server

How to configure the EdgeRouter to act as an L2TP (Layer-2 Tunnel Protocol) server for remote access. Note: These instructions assume that eth0 is your WAN (Internet) connection. Early in the configuration, a specific command should be used in case you receive a...

Adding CAcert root certificate to Debian/Ubuntu

Due to various auditing failures and other security issues, the CAcert root certificate set is slowly disappearing from the Ubuntu and Debian ‘ca-certificates’ package. Fine for security and ensuring your website works with the wider browser world. Not so good if...

20 Command Line Tools to Monitor Linux Performance

It’s really very tough job for every System or Network administrator to monitor and debug Linux System Performance problems every day. After being a Linux Administrator for 5 years in IT industry, I came to know that how hard is to monitor and keep systems up and...

Finding an e-mail spammer on your server

For years now, spam has been a nuisance that has plagued many internet users. Most people however, think that spam e-mail is being sent out by an actual person behind an actual computer, while in reality, these spammers (ab)use hacked e-mail/server accounts, or...

Pin It on Pinterest