OptusNET Wireless High Speed Internet
We are the leader in delivering innovative communications, information and entertainment. We offer voice, data and video products and services over intelligent wireless, broadband and global IP networks that meet customers growing demand for speed, mobility, security and control. As a committed corporate citizen, we use our advanced communications services to address important issues confronting our society.WiFi power level of Cisco access points
Power, power power.... One of the MOST important design factors is selecting the proper radio TX power for WiFi access points when designing any wireless network. You must consider your lowest common denominator and adjust your power equally between your client and AP...
How to set up automatic updates for Ubuntu Linux 18.04
How do I configure automatic updates for Ubuntu Linux 18.04 LTS “Bionic Beaver” server? The Linux server security is indeed an essential task for sysadmins. One of the most fundamental ways to keep the server secure is by installing security updates on time to...
How to install an SSL Certificate on Aruba ClearPass?
In this article, you will learn how to generate a CSR code and install an SSL Certificate on Aruba ClearPass Policy Manager (CPPM). Besides configuration instructions, you will also discover a few interesting facts about Aruba ClearPass. Finally, in the last section,...
Wireless Wireshark Filters
Basic filter: wlan.addr == 00:11:22:33:44:55 (Mac address) Filter on only authentication: wlan.addr == 00:11:22:33:44:55 (Mac address) && wlan.fc.type_subtype == 0x000b Filter on only association request: wlan.addr == 00:11:22:33:44:55 (Mac address) &&...
Confused by protocols? Keep it simple
When is a standard not a standard? For me the answer is clear. It’s when you are effectively at the mercy of a manufacturer to keep supplying and supporting the devices you specify as part of what is probably a five-figure project. If they don’t (and we’ve probably...
Network monitoring and management
Most IT buyers put network monitoring and management tools in place and expect them to just work. Unfortunately, the tools require upfront planning, detailed configuration and ongoing maintenance to ensure the technology delivers on its promise. Inventory...
9 reasons to turn down the transmit power of your Wi-Fi
By default almost all WiFi access points transmit at full power (100mW on 2.4GHz). This gives maximum coverage and users see a good signal (“full bars”). However, there are good reasons to turn down the transmit power to a fraction of the maximum. It even makes sense...
XenServer – Secure SNMP Installation (Version 3)
This tutorial describes a detailed procedure showing how to perform the installation of Secure SNMP (Version 3 ) on a computer running XenServer Remotely access the XenServer server via SSH. In our example, we are using the putty software to remotely...
UniFi – Where is ?
You will see in many of our configuration instructions. When following these instructions you are supposed to substitute with the corresponding location in your computer. Its location will vary depending on your operating system. Find in the following...
How to sync your Microsoft OneDrive cloud storage with Linux
While Microsoft has been making a lot of progress in supporting open source software, and released things such as SQL Server on Linux, their support for consumer software is still lacking. But while applications like Office are still not available for...
Major macOS High Sierra Bug Allows Full Admin Access Without Password – How to Fix
There appears to be a serious bug in macOS High Sierra that enables the root superuser on a Mac with a blank password and no security check. The bug, discovered by developer Lemi Ergin, lets anyone log into an admin account using the username "root" with...
PC vendors scramble as Intel announces vulnerability in firmware
Millions of computers could be remotely hijacked through bug in firmware code. Intel has issued a security alert that management firmware on a number of recent PC, server, and Internet-of-Things processor platforms are vulnerable to remote attack. Using...
Wi-Fi KRACK, How to Protect Yourself
It was this morning revealed every Wi-Fi network is potentially at risk as a result of a vulnerability called 'Wi-Fi KRACK'. It allows 'snoopers' to eavesdrop on traffic between network devices (i.e. computers, laptops and tablets) and a wireless access...
Secure NTP template
The Network Time Protocol (NTP) is the de-facto means Internet hosts use to synchronize their clocks. A reliable and accurate notion of time is important for a number of services, including distributed applications, authentication services, multi-user...
How to Add Devices to LibreNMS Monitoring Tool
This guide focus on adding devices to LibreNMS tool for monitoring. Assuming that you have a working setup for LibreNMS monitoring tool, if not, follow the below guide. For a demo purpose, we will install and configure SNMP on the client servers (Linux machines), and...
Creating Ethernet loopback cable with RJ45 connector
This article will help us with a small hardware testing tool which helps verify whether interface port is working or not. The small testing tool is an RJ45 based Ethernet Testing tool which can be created within minutes by connecting wires as per defined...
Ransomware ‘Nyetya’ behind new global cyber attack
The computer virus that is affecting companies and institutions around the world is a new variant of ransomware called Nyetya -- WannaCry's bad cousin -- according to networking and security major Cisco. The new cyber attack started massively affecting dozens of...
A massive new Petya/Petrwrap ransomware attack is spreading around the globe
A month after the WannaCry ransomware attack paralyzed connected systems worldwide, a new threat appears to be spreading quickly. As reports emerge, today’s attack paints a picture of businesses and governments around the world held hostage by a second major wave of...
When SNMP spams the log
On Linux systems SNMP usually protocols incoming SNMP connections in your syslog file. Depending on your SNMP polling cycle and your amount of monitoring systems the entries will multiplied. . Example: Mar 4 21:12:48 hostname snmpd[31684]: Connection from UDP:...
Difference between QSFP, QSFP+ and QSFP28
SFP is short for small form factor. It refers to fiber optic transceivers supporting 1Gbps data rate. Except SFP, current market is full of various types of fiber optic transceivers, such as QSFP, QSFP+ and QSFP28. At the first sight, these transceiver...
What is the difference between an IDS and an IPS?
IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) both increase the security level of networks, monitoring traffic and inspecting and scanning packets for suspicious data. Detection in both systems is mainly based on signatures already...