OptusNET Wireless High Speed Internet

We are the leader in delivering innovative communications, information and entertainment. We offer voice, data and video products and services over intelligent wireless, broadband and global IP networks that meet customers growing demand for speed, mobility, security and control. As a committed corporate citizen, we use our advanced communications services to address important issues confronting our society.

9 reasons to turn down the transmit power of your Wi-Fi

By default almost all WiFi access points transmit at full power (100mW on 2.4GHz). This gives maximum coverage and users see a good signal (“full bars”). However, there are good reasons to turn down the transmit power to a fraction of the maximum. It even makes sense...

WiFi power level of Cisco access points

WiFi power level of Cisco access points

Power, power power.... One of the MOST important design factors is selecting the proper radio TX power for WiFi access points when designing any wireless network. You must consider your lowest common denominator and adjust your power equally between your client and AP...

How to set up automatic updates for Ubuntu Linux 18.04

How to set up automatic updates for Ubuntu Linux 18.04

How do I configure automatic updates for Ubuntu Linux 18.04 LTS “Bionic Beaver” server?   The Linux server security is indeed an essential task for sysadmins. One of the most fundamental ways to keep the server secure is by installing security updates on time to...

Confused by protocols? Keep it simple

Confused by protocols? Keep it simple

When is a standard not a standard? For me the answer is clear. It’s when you are effectively at the mercy of a manufacturer to keep supplying and supporting the devices you specify as part of what is probably a five-figure project. If they don’t (and we’ve probably...

Network monitoring and management

Network monitoring and management

Most IT buyers put network monitoring and management tools in place and expect them to just work. Unfortunately, the tools require upfront planning, detailed configuration and ongoing maintenance to ensure the technology delivers on its promise. Inventory...

XenServer – Secure SNMP Installation (Version 3)

This tutorial describes a detailed procedure showing how to perform the installation of Secure SNMP (Version 3 ) on a computer running XenServer Remotely access the XenServer server via SSH. In our example, we are using the putty software to remotely...

UniFi – Where is ?

UniFi – Where is ?

You will see in many of our configuration instructions. When following these instructions you are supposed to substitute with the corresponding location in your computer. Its location will vary depending on your operating system. Find in the following...

How to sync your Microsoft OneDrive cloud storage with Linux

How to sync your Microsoft OneDrive cloud storage with Linux

While Microsoft has been making a lot of progress in supporting open source software, and released things such as SQL Server on Linux, their support for consumer software is still lacking. But while applications like Office are still not available for...

PC vendors scramble as Intel announces vulnerability in firmware

PC vendors scramble as Intel announces vulnerability in firmware

Millions of computers could be remotely hijacked through bug in firmware code. Intel has issued a security alert that management firmware on a number of recent PC, server, and Internet-of-Things processor platforms are vulnerable to remote attack. Using...

Wi-Fi KRACK, How to Protect Yourself

Wi-Fi KRACK, How to Protect Yourself

It was this morning revealed every Wi-Fi network is potentially at risk as a result of a vulnerability called 'Wi-Fi KRACK'. It allows 'snoopers' to eavesdrop on traffic between network devices (i.e. computers, laptops and tablets) and a wireless access...

Secure NTP template

Secure NTP template

The Network Time Protocol (NTP) is the de-facto means Internet hosts use to synchronize their clocks. A reliable and accurate notion of time is important for a number of services, including distributed applications, authentication services, multi-user...

How to Add Devices to LibreNMS Monitoring Tool

How to Add Devices to LibreNMS Monitoring Tool

This guide focus on adding devices to LibreNMS tool for monitoring. Assuming that you have a working setup for LibreNMS monitoring tool, if not, follow the below guide. For a demo purpose, we will install and configure SNMP on the client servers (Linux machines), and...

Creating Ethernet loopback cable with RJ45 connector

Creating Ethernet loopback cable with RJ45 connector

This article will help us with a small hardware testing tool which helps verify whether interface port is working or not. The small testing tool is an RJ45 based Ethernet Testing tool which can be created within minutes by connecting wires as per defined...

Ransomware ‘Nyetya’ behind new global cyber attack

Ransomware ‘Nyetya’ behind new global cyber attack

The computer virus that is affecting companies and institutions around the world is a new variant of ransomware called Nyetya -- WannaCry's bad cousin -- according to networking and security major Cisco. The new cyber attack started massively affecting dozens of...

When SNMP spams the log

When SNMP spams the log

On Linux systems SNMP usually protocols incoming SNMP connections in your syslog file. Depending on your SNMP polling cycle and your amount of monitoring systems the entries will multiplied. . Example: Mar 4 21:12:48 hostname snmpd[31684]: Connection from UDP:...

Difference between QSFP, QSFP+ and QSFP28

Difference between QSFP, QSFP+ and QSFP28

SFP is short for small form factor. It refers to fiber optic transceivers supporting 1Gbps data rate. Except SFP, current market is full of various types of fiber optic transceivers, such as QSFP, QSFP+ and QSFP28. At the first sight, these transceiver...

What is the difference between an IDS and an IPS?

What is the difference between an IDS and an IPS?

IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) both increase the security level of networks, monitoring traffic and inspecting and scanning packets for suspicious data. Detection in both systems is mainly based on signatures already...

Are your customers ready to repel ransomware?

Are your customers ready to repel ransomware?

More than four out of five (83%) resellers see ransomware attacks as the main threat – but most are not ready to counter any such attack. In a survey carried out for WatchGuard, 45% of resellers said they believed less than half of their customers would have the right...

How To Use SSHFS to Mount Remote File Systems Over SSH

How To Use SSHFS to Mount Remote File Systems Over SSH

In many cases it can become cumbersome to transfer files to and from a droplet. Imagine a development usage scenario where you are coding apps remotely and find yourself uploading a script repeatedly to your virtual server to test. This can become quite a hassle in a...

Pin It on Pinterest