#Configure Router Settings
Explore tagged Tumblr posts
fixmypc24ex · 2 months ago
Text
I Caught My Neighbor Trying to Use My Wi-Fi—Here's How I Blocked Them
0 notes
mostlysignssomeportents · 1 year ago
Text
Twinkfrump Linkdump
Tumblr media
I'm touring my new, nationally bestselling novel The Bezzle! Catch me in CHICAGO (Apr 17), Torino (Apr 21) Marin County (Apr 27), Winnipeg (May 2), Calgary (May 3), Vancouver (May 4), and beyond!
Tumblr media
Welcome to the seventeenth Pluralistic linkdump, a collection of all the miscellany that didn't make it into the week's newsletter, cunningly wrought together in a single edition that ranges from the first ISP to AI nonsense to labor organizing victories to the obituary of a brilliant scientist you should know a lot more about! Here's the other 16 dumps:
https://pluralistic.net/tag/linkdump/
If you're reading this (and you are!), it was delivered to you by an internet service provider. Today, the ISP industry is calcified, controlled by a handful of telcos and cable companies. But the idea of an "ISP" didn't come out of a giant telecommunications firm – it was created, in living memory, by excellent nerds who are still around.
Depending on how you reckon, The Little Garden was either the first or the second ISP in America. It was named after a Palo Alto Chinese restaurant frequented by its founders. To get a sense of that founding, read these excellent recollections by Tom Jennings, whose contributions include the seminal zine Homocore, the seminal networking protocol Fidonet, and the seminal third-party PC ROM, whence came Dell, Gateway, Compaq, and every other "PC clone" company.
The first installment describes how an informal co-op to network a few friends turned into a business almost by accident, with thousands of dollars flowing in and out of Jennings' bank account:
https://www.sensitiveresearch.com/Archive/TLG/TLG.html
And it describes how that ISP set a standard for neutrality, boldly declaring that "TLGnet exercises no control whatsoever over the content of the information." They introduced an idea of radical transparency, documenting their router configurations and other technical details and making them available to the public. They hired unskilled punk and queer kids from their communities and trained them to operate the network equipment they'd invented, customized or improvised.
In part two, Jennings talks about the evolution of TLG's radical business-plan: to offer unrestricted service, encouraging their customers to resell that service to people in their communities, having no lock-in, unbundling extra services including installation charges – the whole anti-enshittification enchilada:
https://www.sensitiveresearch.com/Archive/TLG/
I love Jennings and his work. I even gave him a little cameo in Picks and Shovels, the third Martin Hench novel, which will be out next winter. He's as lyrical a writer about technology as you could ask for, and he's also a brilliant engineer and thinker.
The Little Garden's founders and early power-users have all fleshed out Jennings' account of the birth of ISPs. Writing on his blog, David "DSHR" Rosenthal rounds up other histories from the likes of EFF co-founder John Gilmore and Tim Pozar:
https://blog.dshr.org/2024/04/the-little-garden.html
Rosenthal describes some of the more exotic shenanigans TLG got up to in order to do end-runs around the Bell system's onerous policies, hacking in the purest sense of the word, for example, by daisy-chaining together modems in regions with free local calling and then making "permanent local calls," with the modems staying online 24/7.
Enshittification came to the ISP business early and hit it hard. The cartel that controls your access to the internet today is a billion light-years away from the principled technologists who invented the industry with an ethos of care, access and fairness. Today's ISPs are bitterly opposed to Net Neutrality, the straightforward proposition that if you request some data, your ISP should send it to you as quickly and reliably as it can.
Instead, ISPs want to offer "slow-lanes" where they will relegate the whole internet, except for those companies that bribe the ISP to be delivered at normal speed. ISPs have a laughably transparent way of describing this: they say that they're allowing services to pay for "fast lanes" with priority access. This is the same as the giant grocery store that charges you extra unless you surrender your privacy with a "loyalty card" – and then says that they're offering a "discount" for loyal customers, rather than charging a premium to customers who don't want to be spied on.
The American business lobby loves this arrangement, and hates Net Neutrality. Having monopolized every sector of our economy, they are extremely fond of "winner take all" dynamics, and that's what a non-neutral ISP delivers: the biggest services with the deepest pockets get the most reliable delivery, which means that smaller services don't just have to be better than the big guys, they also have to be able to outbid them for "priority carriage."
If everything you get from your ISP is slow and janky, except for the dominant services, then the dominant services can skimp on quality and pocket the difference. That's the goal of every monopolist – not just to be too big to fail, but also too big to care.
Under the Trump administration, FCC chair Ajit Pai dismantled the Net Neutrality rule, colluding with American big business to rig the process. They accepted millions of obviously fake anti-Net Neutrality comments (one million identical comments from @pornhub.com addresses, comments from dead people, comments from sitting US Senators who support Net Neutrality) and declared open season on American internet users:
https://ag.ny.gov/press-release/2021/attorney-general-james-issues-report-detailing-millions-fake-comments-revealing
Now, Biden's FCC is set to reinstate Net Neutrality – but with a "compromise" that will make mobile internet (which nearly all of use sometimes, and the poorest of us are reliant on) a swamp of anticompetitive practices:
https://cyberlaw.stanford.edu/blog/2024/04/harmful-5g-fast-lanes-are-coming-fcc-needs-stop-them
Under the proposed rule, mobile carriers will be able to put traffic to and from apps in the slow lane, and then extort bribes from preferred apps for normal speed and delivery. They'll rely on parts of the 5G standard to pull off this trick.
The ISP cartel and the FCC insist that this is fine because web traffic won't be degraded, but of course, every service is hellbent on pushing you into using apps instead of the web. That's because the web is an open platform, which means you can install ad- and privacy-blockers. More than half of web users have installed a blocker, making it the largest boycott in human history:
https://doc.searls.com/2023/11/11/how-is-the-worlds-biggest-boycott-doing/
But reverse-engineering and modding an app is a legal minefield. Just removing the encryption from an app can trigger criminal penalties under Section 1201 of the DMCA, carrying a five-year prison sentence and a $500k fine. An app is just a web-page skinned in enough IP that it's a felony to mod it.
Apps are enshittification's vanguard, and the fact that the FCC has found a way to make them even worse is perversely impressive. They're voting on this on April 25, and they have until April 24 to fix this. They should. They really should:
https://docs.fcc.gov/public/attachments/DOC-401676A1.pdf
In a just world, cheating ripoff ISPs would the top tech policy story. The operational practices of ISPs effect every single one us. We literally can't talk about tech policy without ISPs in the middle. But Net Neutrality is an also-ran in tech policy discourse, while AI – ugh ugh ugh – is the thing none of us can shut up about.
This, despite the fact that the most consequential AI applications sum up to serving as a kind of moral crumple-zone for shitty business practices. The point of AI isn't to replace customer service and other low-paid workers who have taken to demanding higher wages and better conditions – it's to fire those workers and replace them with chatbots that can't do their jobs. An AI salesdroid can't sell your boss a bot that can replace you, but they don't need to. They only have to convince your boss that the bot can do your job, even if it can't.
SF writer Karl Schroeder is one of the rare sf practitioners who grapples seriously with the future, a "strategic foresight" guy who somehow skirts the bullshit that is the field's hallmark:
https://pluralistic.net/2024/03/07/the-gernsback-continuum/#wheres-my-jetpack
Writing on his blog, Schroeder describes the AI debates roiling the Association of Professional Futurists, and how it's sucking him into being an unwilling participant in the AI hype cycle:
https://kschroeder.substack.com/p/dragged-into-the-ai-hype-cycle
Schroeder's piece is a thoughtful meditation on the relationship of SF's thought-experiments and parables about AI to the promises of AI hucksters, who promise that a) "general artificial intelligence" is just around the corner and that b) it will be worth trillions of dollars.
Schroeder – like other sf writers including Ted Chiang and Charlie Stross (and me) – comes to the conclusion that AI panic isn't about AI, it's about power. The artificial life-form devouring the planet and murdering our species is the limited liability corporation, and its substrate isn't silicon, it's us, human bodies:
What’s lying underneath all our anxieties about AGI is an anxiety that has nothing to do with Artificial Intelligence. Instead, it’s a manifestation of our growing awareness that our world is being stolen from under us. Last year’s estimate put the amount of wealth currently being transferred from the people who made it to an idle billionaire class at $5.2 trillion. Artificial General Intelligence whose environment is the server farms and sweatshops of this class is frightening only because of its capacity to accelerate this greatest of all heists.
After all, the business-case for AI is so very thin that the industry can only survive on a torrent of hype and nonsense – like claims that Amazon's "Grab and Go" stores used "AI" to monitor shoppers and automatically bill them for their purchases. In reality, the stores used thousands of low-paid Indian workers to monitor cameras and manually charge your card. This happens so often that Indian technologists joke that "AI" stands for "absent Indians":
https://pluralistic.net/2024/01/29/pay-no-attention/#to-the-little-man-behind-the-curtain
Isn't it funny how all the really promising AI applications are in domains that most of us aren't qualified to assess? Like the claim that Google's AI was producing millions of novel materials that will shortly revolutionize all forms of production, from construction to electronics to medical implants:
https://deepmind.google/discover/blog/millions-of-new-materials-discovered-with-deep-learning/
That's what Google's press-release claimed, anyway. But when two groups of experts actually pulled a representative sample of these "new materials" from the Deep Mind database, they found that none of these materials qualified as "credible, useful and novel":
https://pubs.acs.org/doi/10.1021/acs.chemmater.4c00643
Writing about the researchers' findings for 404 Media, Jason Koebler cites Berkeley researchers who concluded that "no new materials have been discovered":
https://www.404media.co/google-says-it-discovered-millions-of-new-materials-with-ai-human-researchers/
The researchers say that AI data-mining for new materials is promising, but falls well short of Google's claim to be so transformative that it constitutes the "equivalent to nearly 800 years’ worth of knowledge" and "an order-of-magnitude expansion in stable materials known to humanity."
AI hype keeps the bubble inflating, and for so long as it keeps blowing up, all those investors who've sunk their money into AI can tell themselves that they're rich. This is the essence of "a bezzle": "The magic interval when a confidence trickster knows he has the money he has appropriated but the victim does not yet understand that he has lost it":
https://pluralistic.net/2023/03/09/autocomplete-worshippers/#the-real-ai-was-the-corporations-that-we-fought-along-the-way
Among the best debezzlers of AI are the Princeton Center for Information Technology Policy's Arvind Narayanan and Sayash Kapoor, who edit the "AI Snake Oil" blog. Now, they've sold a book with the same title:
https://www.aisnakeoil.com/p/ai-snake-oil-is-now-available-to
Obviously, books move a lot more slowly than blogs, and so Narayanan and Kapoor say their book will focus on the timeless elements of identifying and understanding AI snake oil:
In the book, we explain the crucial differences between types of AI, why people, companies, and governments are falling for AI snake oil, why AI can’t fix social media, and why we should be far more worried about what people will do with AI than about anything AI will do on its own. While generative AI is what drives press, predictive AI used in criminal justice, finance, healthcare, and other domains remains far more consequential in people’s lives. We discuss in depth how predictive AI can go wrong. We also warn of the dangers of a world where AI continues to be controlled by largely unaccountable big tech companies.
The book's out in September and it's up for pre-order now:
https://bookshop.org/p/books/ai-snake-oil-what-artificial-intelligence-can-do-what-it-can-t-and-how-to-tell-the-difference-arvind-narayanan/21324674
One of the weirder and worst side-effects of the AI hype bubble is that it has revived the belief that it's somehow possible for giant platforms to monitor all their users' speech and remove "harmful" speech. We've tried this for years, and when humans do it, it always ends with disfavored groups being censored, while dedicated trolls, harassers and monsters evade punishment:
https://pluralistic.net/2022/08/07/como-is-infosec/
AI hype has led policy-makers to believe that we can deputize online services to spy on all their customers and block the bad ones without falling into this trap. Canada is on the verge of adopting Bill C-63, a "harmful content" regulation modeled on examples from the UK and Australia.
Writing on his blog, Canadian lawyer/activist/journalist Dimitri Lascaris describes the dire speech implications for C-63:
https://dimitrilascaris.org/2024/04/08/trudeaus-online-harms-bill-threatens-free-speech/
It's an excellent legal breakdown of the bill's provisions, but also a excellent analysis of how those provisions are likely to play out in the lives of Canadians, especially those advocating against genocide and taking other positions the that oppose the agenda of the government of the day.
Even if you like the Trudeau government and its policies, these powers will accrue to every Canadian government, including the presumptive (and inevitably, totally unhinged) near-future Conservative majority government of Pierre Poilievre.
It's been ten years since Martin Gilens and Benjamin I Page published their paper that concluded that governments make policies that are popular among elites, no matter how unpopular they are among the public:
https://www.cambridge.org/core/journals/perspectives-on-politics/article/testing-theories-of-american-politics-elites-interest-groups-and-average-citizens/62327F513959D0A304D4893B382B992B
Now, this is obviously depressing, but when you see it in action, it's kind of wild. The Biden administration has declared war on junk fees, from "resort fees" charged by hotels to the dozens of line-items added to your plane ticket, rental car, or even your rent check. In response, Republican politicians are climbing to their rear haunches and, using their actual human mouths, defending junk fees:
https://prospect.org/politics/2024-04-12-republicans-objectively-pro-junk-fee/
Congressional Republicans are hell-bent on destroying the Consumer Finance Protection Bureau's $8 cap on credit-card late-fees. Trump's presumptive running-mate Tim Scott is making this a campaign plank: "Vote for me and I will protect your credit-card company's right to screw you on fees!" He boasts about the lobbyists who asked him to take this position: champions of the public interest from the Consumer Bankers Association to the US Chamber of Commerce.
Banks stand to lose $10b/year from this rule (which means Americans stand to gain $10b/year from this rule). What's more, Scott's attempt to kill the rule is doomed to fail – there's just no procedural way it will fly. As David Dayen writes, "Not only does this vote put Republicans on the spot over junk fees, it’s a doomed vote, completely initiated by their own possible VP nominee."
This is an hilarious own-goal, one that only brings attention to a largely ignored – but extremely good – aspect of the Biden administration. As Adam Green of Bold Progressives told Dayen, "What’s been missing is opponents smoking themselves out and raising the volume of this fight so the public knows who is on their side."
The CFPB is a major bright spot in the Biden administration's record. They're doing all kind of innovative things, like making it easy for you to figure out which bank will give you the best deal and then letting you transfer your account and all its associated data, records and payments with a single click:
https://pluralistic.net/2023/10/21/let-my-dollars-go/#personal-financial-data-rights
And now, CFPB chair Rohit Chopra has given a speech laying out the agency's plan to outlaw data-brokers:
https://www.consumerfinance.gov/about-us/newsroom/prepared-remarks-of-cfpb-director-rohit-chopra-at-the-white-house-on-data-protection-and-national-security/
Yes, this is some good news! There is, in fact, good news in the world, bright spots amidst all the misery and terror. One of those bright spots? Labor.
Unions are back, baby. Not only do the vast majority of Americans favor unions, not only are new shops being unionized at rates not seen in generations, but also the largest unions are undergoing revolutions, with control being wrestled away from corrupt union bosses and given to the rank-and-file.
Many of us have heard about the high-profile victories to take back the UAW and Teamsters, but I hadn't heard about the internal struggles at the United Food and Commercial Workers, not until I read Hamilton Nolan's gripping account for In These Times:
https://inthesetimes.com/article/revolt-aisle-5-ufcw-grocery-workers-union
Nolan profiles Faye Guenther, president of UFCW Local 3000 and her successful and effective fight to bring a militant spirit back to the union, which represents a million grocery workers. Nolan describes the fight as "every bit as dramatic as any episode of Game of Thrones," and he's not wrong. This is an inspiring tale of working people taking power away from scumbag monopoly bosses and sellout fatcat leaders – and, in so doing, creating a institution that gets better wages, better working conditions, and a better economy, by helping to block giant grocery mergers like Kroger/Albertsons.
I like to end these linkdumps on an up note, so it feels weird to be closing out with an obituary, but I'd argue that any celebration of the long life and many accomplishments of my friend and mentor Anne Innis Dagg is an "up note."
I last wrote about Anne in 2020, on the release of a documentary about her work, "The Woman Who Loved Giraffes":
https://pluralistic.net/2020/02/19/pluralist-19-feb-2020/#annedagg
As you might have guessed from the title of that doc, Anne was a biologist. She was the first woman scientist to do field-work on giraffes, and that work was so brilliant and fascinating that it kicked off the modern field of giraffology, which remains a woman-dominated specialty thanks to her tireless mentoring and support for the scientists that followed her.
Anne was also the world's most fearsome slayer of junk-science "evolutionary psychology," in which "scientists" invent unfalsifiable just-so stories that prove that some odious human characteristic is actually "natural" because it can be found somewhere in the animal kingdom (i.e., "Darling, please, it's not my fault that I'm fucking my grad students, it's the bonobos!").
Anne wrote a classic – and sadly out of print – book about this that I absolutely adore, not least for having one of the best titles I've ever encountered: "Love of Shopping" Is Not a Gene:
https://memex.craphound.com/2009/11/04/love-of-shopping-is-not-a-gene-exposing-junk-science-and-ideology-in-darwinian-psychology/
Anne was my advisor at the University of Waterloo, an institution that denied her tenure for fifty years, despite a brilliant academic career that rivaled that of her storied father, Harold Innis ("the thinking person's Marshall McLuhan"). The fact that Waterloo never recognized Anne is doubly shameful when you consider that she was awarded the Order of Canada:
https://nationalpost.com/news/canada/queen-of-giraffes-among-new-order-of-canada-recipients-with-global-influence
Anne lived a brilliant live, struggling through adversity, never compromising on her principles, inspiring a vast number of students and colleagues. She lived to ninety one, and died earlier this month. Her ashes will be spread "on the breeding grounds of her beloved giraffes" in South Africa this summer:
https://obituaries.therecord.com/obituary/anne-innis-dagg-1089534658
Tumblr media
If you'd like an essay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/04/13/goulash/#material-misstatement
Tumblr media
Image: Valeva1010 https://commons.wikimedia.org/wiki/File:Hungarian_Goulash_Recipe.png
CC BY-SA 4.0 https://creativecommons.org/licenses/by-sa/4.0/deed.en
90 notes · View notes
lamarie-artsy · 5 months ago
Text
Sister came home from work early, tried asking her about the router, she blew up at me as expected.
Trying to see if reinstalling the wifi drivers will help with the problems I've been repeatedly having, but 8m having trouble downloading because of said issues 🙃
3 notes · View notes
matsonkey · 1 year ago
Text
Tumblr media Tumblr media Tumblr media
found this and couldn't reblog so I'm reposting
Tumblr media
image id:
first image: two-part meme of joey from friends. first part is a picture of him smiling at something out of frame, captioned "The hotel's free WiFi is really fast". second part is him staring wide eyed in horror, captioned "Your IP address starts with 172.16.42.x".
second image: lain from the anime "serial experiments lain" sitting in a chair in a dim room, in front of a glowing computer screen, and smiling at the camera. the text boxes in the image say:
Hey, guys. Lain Iwakura here to explain the joke.
You see, when a computer like your laptop or smartphone connects to wifi, the router assigns it a "local IP address" to distinguish it from other machines on the network.
Most routers use IPv4 for this, where an IP address is four numbers separated by periods. The first two or three numbers of your local IP address are usually the same for all machines on the LAN, and the most common schemas for local IP addresses are 192.168.0.x or 10.0.0.x. Those are just common defaults - they can be set to anything in the router's configuration.
The address schema 172.16.42.x is not a common default for a normal router. It is the default for a device called a "WiFi Pineapple", which is a hacking tool primarily intended for "pentesting", i.e. finding exploitable vulnerabilities in a computing or networking system. The WiFi Pineapple acts as a router from the perspective of the computers on the local network, but a malicious actor can use it to passively scan those computers for vulnerabilities, and can even spy on network traffic going through it. Thus, the joke is that the person in the hotel, finding that their local IP address is under 172.16.42.x., realizes to their horror that the hotel's LAN has been pwned by a (likely malicious) rogue access point, possibly causing their computer to be cracked and their sensitive information to be stolen by cybercriminals. In light of this breach, their panic is understandable! Always keep your software up to date and never connect to a suspicious or unsecured wifi network!
/end id
61 notes · View notes
stuarttechnologybob · 16 days ago
Text
What types of issues does technical support handle?
Technical Support Services
Tumblr media
Technical Supporting services serve a vital role and prospect, by keeping businesses and organizations running efficiently & active by resolving their IT-related problems and issues. From minor glitches to major disruptions errors, technical support teams and professional experts help to ensure that systems remain up and running while in use, allowing the users to stay productive and alert. But what exactly do they handle? Let's take a closer look at what to look for and they assist with.
Hardware and Device Issues:
Technical supporting teams and professional experts assist with problems related to desktops, laptops, printers, scanners, and other hardware. As this includes and consists of deliverables fixing hardware failures, replacing parts, configuring devices, and troubleshooting connectivity or performance issues. Whether it's a malfunctioning keyboard or a slow-loading workstation, Technical Support is there to help.
Software Installation and Troubleshooting:
From installing and implementing the applications to resolving and assisting the software errors and glitches, technical Support guides various software-related and applications concerns and points at a time. They help and assist with updating programs, fixing bugs, assuring the overall compatibility within the operating systems, and restoring the performance if an app crashes or freezes.
Network and Connectivity Problems:
A strong network and support is the backbone of modern businesses and companies. Technical Supporting officials handle and maintain the internet issues, router configuration, VPN access, slow connection speeds, and network outages. Whether it's a minor or impactful Wi-Fi issue or a more significant server connectivity problem, the support team works to restore communication quickly.
Email and Communication Tools:
Email downtime can affect the business continuity and its proceedings. The technical supporting team manages email configuration, syncing errors, spam filters, and login issues and errors across multiple devices and platforms, including Outlook and Gmail. They also handle collaboration tools like Teams, Slack, or Zoom when they don't function as expected.
Security & Access Management:
Working professionals play an essential role in managing the IT security measures and operating parameters. While they also assist to reset passwords settings, also help to manage the user accounts, set up two-factor authentication, and address down the ongoing suspicious activity.
Personalized Help and Guidance:
From onboarding and completing setup for the new users to answering tech-related questions, technical Support assures that employees use systems efficiently. Their goal is to minimize downtime and boost productivity. Companies like Suma Soft, IBM, Cyntexa, and Cignex offer dependable technical support services tailored to your specific business needs. Their expertise helps resolve issues faster and keeps your systems up and running at all times.
3 notes · View notes
wayfire-official · 2 months ago
Text
I finally figured out the whole DNS bullshit.
Turns out it actually was a problem with my router.
I hadn't configured DNS rebind protection, so my router blocked all DNS answers which answered with an IP that's inside the network. And since I was pretty much always testing it from within the network I never got an answer. I hadn't heard about it before and the setting was somewhere I didn't look.
I'll probably still keep most of my stuff behind a proxy, just to ensure I can always access it, but at least I can now be confident that people can join my Minecraft server and all that.
So now I'm pretty much just waiting until ipv6 gets more support and I'll be good
4 notes · View notes
marxistfurry · 3 months ago
Text
How to Torrent Anonymously
Using the standard BitTorrent protocol is insecure if you're torrenting copyrighted material, because you must connect directly to your peers to download the file. This means that a copyright holder could seed a movie that they own, collect the IP addresses that connect to them, then sue them all for copyright infringement. If we want to torrent copyrighted material without any chance of getting caught, we'll need to send the traffic through a mixnet.
Your first thought might be to route the traffic through tor, but this is actually a bad idea. See this post for why (TL;DR, torrenting over tor slows down the network because it wasn't built for that type of traffic, and certain BitTorrent clients will leak your IP address even if you configure them to go through tor). Tor is out, but i2p will work. I2P is a mixnet like tor, but it has a few key differences, which I won't go over here. Suffice to say, i2p can handle the traffic from torrenting (because it was built in a different way than tor), and it has its own torrent client built-it that preserves your anonymity, called i2psnark. This is what you should use for anonymous torrenting.
Step 1. Install i2p. Be sure to read the post-install work on that page, because i2p may not work without a little bit of tweaking. Troubleshooting i2p is not in the scope of this article, so from this step onwards we will assume i2p is working, and that you can reach i2p deep web sites.
Step 2. Get a magnet link from a tracker. The biggest tracker for i2p torrents is Postman's Tracker, so I would start searching for what you want there. Important: you cannot download normal clearnet torrents using i2psnark. You can only download torrents that were set up on i2p from the start. This means there won't be as many torrents to choose from on i2p trackers, because not as many people use them. However, don't let that turn you away, because the way to fix this problem is to get more people to use them. Anyways, once you've found the torrent you want to download from Postman's Tracker (or whichever tracker you're using), copy the magnet link.
Step 3. Start downloading it in i2psnark. Go to your i2p router console's home page, then scroll down until you see the link to "Torrents" under "Applications and Configuration". Click it, and it will take you to i2psnark. Paste the magnet link in the box that says Add Torrent... From URL, and click the Add Torrent button right next to it. If everything went right, it should appear in the list of torrents. Give it a few minutes to connect to peers, and it should start downloading.
Step 4. Tweak i2psnark's settings. By default, if you have to restart i2p (or your whole computer), i2psnark will not restart downloading or seeding its torrents unless you tell it to. This probably isn't what you want, so click the Configuration button in i2psnark, and check "Auto start torrents". Now they will start on their own. Also, change the Up Bandwidth Limit to something reasonable. It recommends setting it to half of what you set i2p's total bandwidth to be (you did that when you read the Post-Install Work page like I told you to, right?).
Step 5. Enjoy your torrent, and seed it. Congratulations! You just downloaded a torrent anonymously. Now, be sure to seed it. Since everything is being routed anonymously here, you don't have to worry about getting busted for seeding copyrighted material, so go ahead and seed it, so that the torrent can remain available for everyone, and so it will download a little bit faster for the next person. I'd recommend seeding at least until you've uploaded twice as much as you downloaded. Note that this may take a long time to happen, so plan to keep these files on your hard drive for at least 1 month. If you're running low on space, then choose which torrents you download carefully, so that you don't have to delete them before you've given back twice what you downloaded.
Step 6. Give back to the community. Let's say that you own a movie on DVD that isn't on Postman's Tracker. Well, be a good neighbor and share it! First, rip it from DVD using ripping software, like HandBrake. You may need to install this as well, to break whatever weak-sauce copy protection your DVD might have. I recommend using HandBrake's High Profile settings if it's a movie, and the normal settings if it's a TV show with a bunch of episodes.
Once you've ripped the movie, you may want to put it in a zip archive, to lower the amount of data that has to be downloaded. Put the zip file somewhere where it won't be in the way, because if you move it after you start seeding, the torrent won't work for everyone else. Then, go to i2psnark, and type the exact path to the zip file in the "Data to seed" box under Create Torrent. For this example, we'll upload it to Postman's Tracker, so click the radio button for Postman's, and click "Create torrent". This will create a .torrent file, which you will then have to upload to Postman's Tracker.
Here's where it gets tricky. On Linux, by default, i2psnark will create your .torrent file in /var/lib/i2p/i2p-config/i2psnark/. The problem is, only root can access that folder. So, we need to copy the .torrent file somewhere else before we can upload it. So, open up a terminal, and type in sudo cp /var/lib/i2p/i2p-config/i2psnark/<name of torrent>.torrent /home/<your username>/. This will copy the .torrent file to your home directory.
There's still one more problem. The .torrent file's permissions still only allow it to be read by root. So, cd to your home directory, then run sudo chown <your username> <name of torrent>.torrent. Now you can read it normally.
At this point, you are ready to post the torrent on Postman's Tracker. Create an account there, then click Upload on the header. It will take you to a page with instructions for how to upload, and some rules. You should be able to figure everything else out from here. Now, watch as those peers start lining up!
https://raddle.me/wiki/AnonymousTorrenting
4 notes · View notes
voiceapisolutions · 1 month ago
Text
How to Ensure Call Quality and Reliability with a Small Business VoIP Setup
Voice over IP (VoIP) is a cost-effective choice for small businesses. It offers flexibility, scalability, and a range of features. But without the right setup, it can lead to poor audio and dropped calls. Ensuring high call quality requires a few essential steps.
Tumblr media
Choose a Reliable VoIP Provider
Not all VoIP providers offer the same level of quality. Choose one with strong uptime guarantees and positive customer reviews. Look for 24/7 support, service-level agreements, and security features like call encryption. A dependable provider is the foundation of a smooth VoIP experience.
Use High-Speed Internet with Enough Bandwidth
VoIP calls depend heavily on your internet connection. Ensure your bandwidth can handle multiple calls at once. If possible, use a wired Ethernet connection instead of Wi-Fi. A dedicated internet line or business-grade connection can significantly improve reliability.
Invest in Quality VoIP Hardware
Using low-quality headsets or outdated phones can degrade your call quality. Invest in noise-canceling headsets, HD VoIP phones, and routers that support VoIP traffic. Reliable hardware reduces jitter, echo, and call delays, creating a better experience for both parties.
Enable Quality of Service (QoS) Settings
Quality of Service (QoS) is a router feature that prioritizes VoIP traffic. It ensures that voice calls are not interrupted by large downloads or video streaming. Configure your router to prioritize SIP traffic. Most business routers support this, and your provider can help set it up.
Monitor Call Quality Metrics Regularly
Keep an eye on call metrics like jitter, packet loss, and latency. Most VoIP services provide dashboards for performance tracking. If you notice frequent issues, they may indicate deeper network problems. Monitoring helps you catch and fix issues before they affect customers.
Secure Your VoIP Network
VoIP systems can be targets for cyberattacks. Use strong passwords, enable firewalls, and update your software regularly. Consider using a virtual private network (VPN) and ensure your provider supports encrypted calling. Security is crucial for maintaining trust and reliability.
Train Your Team
Your staff plays a big role in maintaining call quality. Train them to use headsets correctly, avoid background noise, and report any issues. A well-informed team helps maintain professional and consistent communication.
In Conclusion
A small business VoIP setup can be reliable with the right approach. Choose wisely, invest in quality equipment, and secure your network. With proper setup and maintenance, VoIP becomes a powerful tool for business growth.
3 notes · View notes
johnnysorrells · 2 months ago
Text
192.168.1.250 Netgear Setup: A Beginner’s Guide
The netgear extenders are widely used by many of the networking users to create a reliable network. Netgear extender devices are known for their performance and stable network. Setting up the extender device is not a daunting task if you are aware of the setup process. In this article we are going to elaborate in detail how you can perform 192.168.1.250 Netgear Setup using the web. Web based setup method is the most reliable way to add the netgear extender into your existing network. Gather the important details and configure any model of netgear wireless range extender device. Scroll up the page and read the information till the last to boost up your network. 
Unboxing The Extender
Unboxing the wireless range extender is the first step of the 192.168.1.250 Netgear Setup. In the box you will find an extender along with power adapter, user guide and ethernet cable (optional). You need all such items for the setup process. In addition to these items you also need host router network details, working internet connection, electric power socket, and computer/ laptop device. 
Placement 
Second step is placement of the device. Proxy placement is needed for the setup. Put the device closer as possible. Also there is no signal interface closer to the router & extender device. 
Boot Up 
Next step of the process is boot up. For booting up you have to use the power adapter you got with the extender. In case your device is a wall plug compact design device then you have to directly connect it with a wall outlet. Boot process might take around 1 to 2 minutes. Before proceeding further towards 192.168.1.250 Netgear Setup using the web, wait for LED lights to stabilize. 
Connect To Extender Network
Step ahead and connect the extender device to the client device using any of the given methods:
Ethernet: Use the ethernet cord you got with the range extender and connect the extender with the client device. Inject the cord’s one end into the ethernet port of the extender and other in the client device ethernet port. Make sure the connection is secured.
Wireless: Using the wireless network of ethernet you can establish a connection. Check out the device label to know the default SSID & password. Use your client device and run a scan for available wireless networks. Enter the details and connect the devices.
Access 192.168.1.250 Netgear Setup Page
Now you have to access 192.160.1.250 netgear setup page by follow the given steps:
Launch google chrome or any other similar browser. 
Thereafter, mention 192.168.1.250 IP in the URL bar. 
A new page appears where you have to provide default information. 
Enter admin and password in the fields. 
Further press login and netgear installation assistant will guide you.
Configure Extender
Once you get access to the configuration page, choose the language first and then your router’s network name. Choose next and enter the password on the screen. Further click on connect option and then next.
Secure Network
Now you have to secure the wireless network by creating an SSID & password for your extender network. Also make changes in the admin account user details. This step is important to keep your existing network secure.
Update Firmware
Afterwards, you need to look for the firmware version. In case the firmware is outdated then you should install the latest version. For installation you can opt for an online update option and follow the prompts. You can update the firmware manually also by downloading it from the official portal of netgear. 
Finalize Setup
Finalize the setup by choosing the submit button once you made all the important changes in the network. Review the changes you made to verify every step. Note down the extender security details you have created and keep them secure. Submit the changes and then you can step further to reposition the device.
Reposition The Extender
Repositioning the extender is a very important step to optimize the network performance. Unplug the extender from the proxy position. Search for a midway position (from the router and the area where the dead spot was). Then plug it in again to the power at the new position. Wait for the device to boot up and monitor the router LED on your extender device. If it’s green then the position is perfect. On the contrary if it turns amber or red then relocate it.
Test New Network
Lastly, test the new network using a wireless handset. Using the new SSID & password connect the device with the extender network and browse, stream or play online to check speed.
Conclusion
Lastly, I would like to rest my words by saying that the 192.168.1.250 Netgear Setup process is a super easy task. By following the above mentioned step by step breakdown of the extender setup process, anyone can configure the extender easily without a tech expert. Setting up an extender device will boost your existing network signal strength and terminate the dead spots from your home or office area. 
2 notes · View notes
mikrotikrouterlogin · 2 months ago
Text
How Do I Log Into My Mikrotik Router?
Tumblr media
To access the Mikrotik router login portal, connect to its network and enter http://192.168.88.1 in your browser. Log in using the default credentials. Alternatively, use the MikroTik Pro app for mobile access. This interface allows you to manage network configurations and security settings. ​Need assistance? Visit our website for detailed guidance.
2 notes · View notes
os2warp · 6 months ago
Text
diy router update
installed the pihole software. its working fine. finally have adblocking back on the things i cant easily change the dns server for. (i had the dns server on my old router set to nextdns but the new router doesn't have the option to change the dns server)
all the configuration files i worked so hard on for dnsmasq are not neciecery anymore because of pihole's built in dhcp server but thats fine i needed to get everything working under the most basic configuration possible before i started making things more complicated.
still gotta sort out that slow wifi issue. the slow ethernet is fine its basicly at the limit of my switch anyway, but the wifi is far slower than it should be.
3 notes · View notes
zerosecurity · 1 year ago
Text
Major Security Vulnerabilities Patched in Cox Modems
Tumblr media
Cybersecurity researcher Sam Curry has recently uncovered a series of critical vulnerabilities in the systems of Cox Communications, a major telecommunications provider. These vulnerabilities could have allowed malicious actors to remotely take control of millions of modems used by Cox's customers, posing a significant risk to their privacy and security.
Bypassing Authorization and Gaining Elevated Privileges
Curry's analysis revealed an API vulnerability that allowed bypassing authorization checks, potentially enabling an unauthenticated attacker to gain the same privileges as Cox's technical support team. This exploit could have allowed attackers to overwrite configuration settings, access the routers, and execute commands on the affected devices. According to the researcher, "This series of vulnerabilities demonstrated a way in which a fully external attacker with no prerequisites could've executed commands and modified the settings of millions of modems, accessed any business customer's PII, and gained essentially the same permissions of an ISP support team."
Potential Attack Scenarios and Risks
In a theoretical attack scenario outlined by Curry, a malicious actor could have searched for a targeted Cox business user through the exposed API using personal information such as their name, email address, phone number, or account number. Once identified, the attacker could have obtained additional information from the targeted user's account, including their Wi-Fi password. With this access, the attacker could have executed arbitrary commands, updated device settings, or take over accounts, potentially compromising sensitive data and personal information.
Responsible Disclosure and Prompt Patching
Curry responsibly reported the vulnerabilities to Cox Communications on March 4, and the company took swift action to prevent exploitation by the next day. Cox also informed the researcher that it conducted a comprehensive security review following the report. Notably, Cox found no evidence of the vulnerability being exploited in the wild for malicious purposes, indicating that the potential risks were mitigated before any significant damage occurred.
Origins of the Attack and Unanswered Questions
The origin of the attack on Curry's modem appears to be from an IP address (159.65.76.209) previously used for phishing campaigns, including targeting a South American cybersecurity company. When Curry tried to get a replacement modem from Cox, they required him to turn in the potentially compromised device, preventing further analysis. Curry's traffic was being intercepted and replayed, suggesting the attacker had access to his home network, though the motive for replaying traffic is unclear. The vulnerabilities found in Cox's systems included lack of authentication checks, allowing arbitrary API requests by simply replaying them. Over 700 APIs were exposed. Cox patched the issues after disclosure but found no evidence the specific attack vector was exploited maliciously before 2023, despite Curry's modem being compromised in 2021. The blog aims to highlight supply chain risks between ISPs and customer devices, though Curry's modem may have been hacked through another unrelated method locally. Read the full article
3 notes · View notes
apexoffices · 1 year ago
Text
Streamline Your Office Setup with These Essential Tips and Gadgets
Tumblr media
Setting up an office can be a daunting task, whether you're working from home or establishing a new workspace for your business. From choosing the right furniture to integrating the latest technology, each decision plays a crucial role in creating an efficient and productive environment. Here's a quick guide to help you get started.
Office Setup Times: Tips for Efficiency
Plan Ahead:
Space Assessment: Measure your office space to understand what furniture and equipment will fit best.
Design Layout: Sketch a layout of your office, considering the placement of desks, chairs, and other essential items. Tools like SketchUp or RoomSketcher can help visualize the space.
Prioritize Ergonomics:
Chair and Desk: Invest in an ergonomic chair and an adjustable desk. Your comfort is paramount to maintaining productivity.
Monitor Positioning: Ensure your monitor is at eye level to reduce strain on your neck and back. A monitor stand or adjustable arm can help with this.
Declutter and Organize:
Storage Solutions: Use shelves, drawers, and organizers to keep your workspace tidy. A clutter-free environment can significantly improve focus and efficiency.
Cable Management: Implement cable organizers or under-desk cable trays to keep cords and wires out of sight.
Set Up Essential Tech:
Computer Setup: Choose a reliable computer or laptop that meets your work requirements. Ensure all necessary software is installed and updated.
Network Configuration: A stable internet connection is critical. Set up your router in a central location and consider using a mesh network for larger spaces.
Test and Adjust:
Trial Run: Spend a day working in your newly set up office to identify any issues or adjustments needed. Pay attention to your comfort, productivity, and overall workflow.
Feedback Loop: Regularly assess your setup and make changes as necessary to optimize your work environment.
Must-Have Tech and Gadgets for Your Office
Smart Lighting:
Philips Hue: These smart bulbs allow you to adjust the lighting based on your needs, helping to reduce eye strain and improve focus.
LIFX Smart Bulbs: Another great option, offering a range of colors and brightness levels that can be controlled via an app or voice assistant.
Ergonomic Keyboard and Mouse:
Logitech MX Keys: A wireless keyboard designed for comfort and efficiency, perfect for long hours of typing.
Logitech MX Master 3: An ergonomic mouse with customizable buttons and excellent precision.
Noise-Cancelling Headphones:
Bose QuietComfort 35 II: Ideal for blocking out distractions and focusing on work.
Sony WH-1000XM4: Another top choice with superior sound quality and noise-cancelling capabilities.
Smart Assistants:
Amazon Echo: Use Alexa to set reminders, control smart devices, and even manage your calendar.
Google Nest Hub: A smart display that integrates with Google Assistant, providing hands-free control and useful information at a glance.
Standing Desk Converter:
VARIDESK Pro Plus: Easily convert your regular desk into a standing desk, promoting better posture and reducing the risks associated with prolonged sitting.
FlexiSpot M2B: Another versatile option that offers ample space for your monitor, keyboard, and other essentials.
High-Quality Webcam:
Logitech Brio: Provides ultra HD video quality for virtual meetings and video calls.
Razer Kiyo: Comes with a built-in ring light, ensuring you look your best in any lighting condition.
Portable Charger:
Anker PowerCore: Keep your devices charged and ready to go with this reliable portable charger.
RAVPower 20000mAh: Another robust option, offering fast charging and multiple ports.
2 notes · View notes
qcs01 · 1 year ago
Text
Ansible Collections: Extending Ansible’s Capabilities
Ansible is a powerful automation tool used for configuration management, application deployment, and task automation. One of the key features that enhances its flexibility and extensibility is the concept of Ansible Collections. In this blog post, we'll explore what Ansible Collections are, how to create and use them, and look at some popular collections and their use cases.
Introduction to Ansible Collections
Ansible Collections are a way to package and distribute Ansible content. This content can include playbooks, roles, modules, plugins, and more. Collections allow users to organize their Ansible content and share it more easily, making it simpler to maintain and reuse.
Key Features of Ansible Collections:
Modularity: Collections break down Ansible content into modular components that can be independently developed, tested, and maintained.
Distribution: Collections can be distributed via Ansible Galaxy or private repositories, enabling easy sharing within teams or the wider Ansible community.
Versioning: Collections support versioning, allowing users to specify and depend on specific versions of a collection. How to Create and Use Collections in Your Projects
Creating and using Ansible Collections involves a few key steps. Here’s a guide to get you started:
1. Setting Up Your Collection
To create a new collection, you can use the ansible-galaxy command-line tool:
ansible-galaxy collection init my_namespace.my_collection
This command sets up a basic directory structure for your collection:
my_namespace/
└── my_collection/
├── docs/
├── plugins/
│ ├── modules/
│ ├── inventory/
│ └── ...
├── roles/
├── playbooks/
├── README.md
└── galaxy.yml
2. Adding Content to Your Collection
Populate your collection with the necessary content. For example, you can add roles, modules, and plugins under the respective directories. Update the galaxy.yml file with metadata about your collection.
3. Building and Publishing Your Collection
Once your collection is ready, you can build it using the following command:
ansible-galaxy collection build
This command creates a tarball of your collection, which you can then publish to Ansible Galaxy or a private repository:
ansible-galaxy collection publish my_namespace-my_collection-1.0.0.tar.gz
4. Using Collections in Your Projects
To use a collection in your Ansible project, specify it in your requirements.yml file:
collections:
- name: my_namespace.my_collection
version: 1.0.0
Then, install the collection using:
ansible-galaxy collection install -r requirements.yml
You can now use the content from the collection in your playbooks:--- - name: Example Playbook hosts: localhost tasks: - name: Use a module from the collection my_namespace.my_collection.my_module: param: value
Popular Collections and Their Use Cases
Here are some popular Ansible Collections and how they can be used:
1. community.general
Description: A collection of modules, plugins, and roles that are not tied to any specific provider or technology.
Use Cases: General-purpose tasks like file manipulation, network configuration, and user management.
2. amazon.aws
Description: Provides modules and plugins for managing AWS resources.
Use Cases: Automating AWS infrastructure, such as EC2 instances, S3 buckets, and RDS databases.
3. ansible.posix
Description: A collection of modules for managing POSIX systems.
Use Cases: Tasks specific to Unix-like systems, such as managing users, groups, and file systems.
4. cisco.ios
Description: Contains modules and plugins for automating Cisco IOS devices.
Use Cases: Network automation for Cisco routers and switches, including configuration management and backup.
5. kubernetes.core
Description: Provides modules for managing Kubernetes resources.
Use Cases: Deploying and managing Kubernetes applications, services, and configurations.
Conclusion
Ansible Collections significantly enhance the modularity, distribution, and reusability of Ansible content. By understanding how to create and use collections, you can streamline your automation workflows and share your work with others more effectively. Explore popular collections to leverage existing solutions and extend Ansible’s capabilities in your projects.
For more details click www.qcsdclabs.com
2 notes · View notes
so-much-for-subtlety · 1 year ago
Note
What ad and tracking blockers do you use for your phone? I’ve been wanting to download some but they always look a bit sketchy
So there are two main types of blockers: blockers that run at network level and blockers that run in the browser (actually browser blockers have two types as well, some that just hide the ads, and some that block them from loading in the first place).
you can try this page as a test to see what type of things are currently blocked (if you’re using Firefox you might get some blocking already) https://d3ward.github.io/toolz/adblock.html
I have don’t actually run anything on my phone, instead I have a DNS server running on my router that uses a blocklist so any request to load ads or tracking gets blocked at my router (there’s a few versions of this but most popular is pi-hole).
The benefits of this approach is:
Automatically works for all devices on network (I have 21 devices on my home network so this is important for me!)
completely local (no reliance on any third party service and very very fast)
no subscription/recurring costs
completely configurable to add/remove certain websites services as desired
Disadvantages:
Only local network (if I’m on cellular I don’t get any protection)
more complex to set up
you have to buy some hardware like a raspberry pi (about $60)
Dosn’t block ads in video like YouTube
But here are some other good options:
Instead of running your own dns server locally you could use a third party DNS server (you already are, but you can switch to use one that also does blocking).
Some of these DNS services might be paid or free, and some of them might harvest your data :/ some might also not have the resources to run a free fast DNS so might block ads but might slow down a bit, and the free options are also not configurable. I think a trustworthy free public DNS option is AdGuard DNS.
If you use desktop (or android), I think the best option is uBlock Origin which runs in the browser. It’s free, open source, trustworthy but not supported by iOS (yet, maybe in the future). The main benefit of browser based blockers like uBlock origin is that I think they are more successful at blocking ads in videos like YouTube (although I think YouTube is always fighting against that so not sure who’s winning right now).
If you’re using iOS, AdGuard also has a native iOS blocking app which will be faster, but unfortunately isn’t free and I honestly can’t make sense of their pricing structure, but I did search and see you can get a lifetime license for $20 here which probably makes sense over a monthly subscription.
it’s a lot of info to take in!
if you’re using a desktop browser (or android) I’d start with uBlock Origin.
if you’re on iOS, I would probably start with their free AdGuard DNS option first and see how fast it is, and if not great maybe try their paid app.
6 notes · View notes
ccnanagpur · 1 year ago
Text
Navigating the CCNA Certification Journey: What You Need to Know
Introduction: Embarking on the journey to obtain the Cisco Certified Network Associate (CCNA) certification is an exciting and rewarding endeavor. Whether you're a networking enthusiast looking to enhance your skills or a professional aiming to boost your career prospects, the CCNA certification can open doors to a world of opportunities. In this blog post, we'll explore the essential aspects you need to know to successfully pass the CCNA certifications. CCNA Classes in Nagpur
Understanding the CCNA Exam Structure: The CCNA certification is designed to validate your knowledge and skills in networking fundamentals, routing and switching technologies, and more. Familiarize yourself with the exam structure, which typically includes multiple-choice questions, simulations, and hands-on labs. Cisco regularly updates its exam blueprints, so staying informed about the latest changes is crucial.
Mastering Networking Fundamentals: A solid understanding of networking fundamentals lays the foundation for CCNA success. Concepts such as OSI model, TCP/IP, subnetting, and VLANs are fundamental to the CCNA exam. Take the time to grasp these concepts thoroughly, as they form the basis for more advanced topics.
Deep Dive into Routing and Switching Technologies: Routing and switching are core components of the CCNA certification. Ensure you are well-versed in configuring and troubleshooting routers and switches. Understand routing protocols like OSPF and EIGRP, and be comfortable with configuring VLANs and spanning-tree protocol.
Hands-On Practice with Cisco Equipment: Practical experience is key to success in the CCNA exams. Set up a lab environment with Cisco routers and switches to gain hands-on experience. Use tools like Packet Tracer or GNS3 to simulate network scenarios and practice troubleshooting. The more you immerse yourself in real-world scenarios, the more confident you'll be during the exam. CCNA Training in Nagpur
Leverage Official Cisco Resources: Cisco provides a wealth of official resources to aid your preparation. Utilize the Cisco Learning Network, official study guides, and documentation to supplement your studies. Cisco's official materials are aligned with the exam objectives, ensuring you cover all the necessary topics.
Explore Training Courses and Study Groups: Consider enrolling in CCNA training courses or joining study groups. Engaging with peers and instructors can provide valuable insights, tips, and support. Online platforms offer a variety of courses, both self-paced and instructor-led, to cater to different learning preferences.
Practice Time Management: Time management is crucial during the CCNA exam. Develop a strategy to allocate time to different sections of the exam. Practice with timed mock exams to improve your pacing and ensure you can complete the entire exam within the allotted time.
Conclusion: Passing the CCNA certification requires dedication, hands-on experience, and a thorough understanding of networking principles. By focusing on the exam objectives, mastering key concepts, and leveraging available resources, you'll be well-prepared to ace the CCNA certification and take the next step in your networking career. Good luck on your CCNA journey! CCNA Course in Nagpur
2 notes · View notes