Sector5 - HWzone Forums
adplus-dvertising
Skip to content
  • Create an account

sector5

registered user
  • Number of messages

    47
  • Join

  • Recently visited

Recent Visitors

Visitors to your profile are disabled, and you can not see who recently visited your profile.

The ratings of sector5

Zone Wannabe

Zone Wannabe (2/6)

0

Rating

  1. Thanks Tomer, I set back up as a router and turned off DHCP, now works both as an access point and as a switch.
  2. Aside from the difference of the switch, will there be a difference between the state of an access point and the state of a second router with DHCP disabled?
  3. Thanks Tomer, good job, the problem is that once I set the router as an access point, it eliminated the additional lan port
  4. Hello to the heavy guns of the forum. I have an old EDIMAX BR-6428nC router on their website it appears that it can be used as a router, as an access point and also increases range. My question is if I can also use it as a switch? And can I also simultaneously use it as an access point? I plan to get internet from moca that is supposed to give internet to a partner converter, and instead connect the internet from moca to the switch and from there to the converter, so I get more free ports what I want. Should you connect the cable coming out of the moca to the blue WAN input or to one of the yellow LAN inputs? There are a lot of champions in the forum, so thanks in advance
  5. Hello to all forum members, I have a laptop with Windows 10 and a raspberry pi running Linux. I'm on a public wifi library, and I want to transfer commands between devices using SSH, and open to external communication only the appropriate PORT for SSH. My problem is that by default, on a public network, each device cannot see the other devices on the network. If I run a test with nmap, I get that only my computer is on the network. Is it possible and how can a device be made visible? And how can I do the reverse process that I want to close the communication between them? Is there a way to make this connection even more secure than I suggested? (Note - I opened an identical thread a few days ago in the "Networks and Internet" forum and did not get an answer there, and on second thought this question is more appropriate for an IT forum, if one of the administrators wants to delete one of the threads, then delete the "Networks and Internet" discussion)
  6. Wrong, if I am on my home network, with the help of a first computer, I can use nmap and see all the devices in my home that are connected to the same network. Conversely, if I am on a public network, and I do the same command, I can see that the only computer connected to the network is my computer. This is a very important function, otherwise all computers will be visible. I need a way to bypass this artificial separation, to be "exposed" of my own free will * Of course I have the internal IP address of the two devices, but it is not possible to communicate between them, because of what I mentioned
  7. Hello all forum members, I have a laptop with Windows 10 and a raspberry pi computer running Linux ubuntu. I am on a public wifi library, and I want to transfer commands between devices using SSH, and open to external communication only the appropriate PORT for SSH. My problem is that by default, on a public network, each device cannot see the other devices on the network. Is it possible and how can a device be made visible? And how can I do the reverse process that I want to close the communication between them? Is there a way to make this connection even more secure than I suggested? Note - I opened the same discussion for this discussion in the IT forum, can you delete the discussion in this forum please, I think the question is more appropriate for the IT forum
  8. Thanks for the link, interesting and I knew the USB that destroyed the circuits, but I did not know that such a USB could be a "normal" size. I thought it must be a relatively large physical size to have room to accept. safety is number one priority
  9. From an in-depth study I did, for the future generation to watch and fear, I give some options I saw online: The options are in the worst case scenario that there is a hardware level and cannot be detected by an antivirus that scans files, Software if clicked. 1. The default solution - not to connect at all, but that's not why we came together. Use a buffered computer that is not connected to the Internet and does not contain important files. 2. Open the on-key disk itself, see if it is an official USB circuit or it is a circuit that contains a micro-controller like Arduino or teensy. 3. Use a computer with Linux, or better yet, Linux that works on a flsh card that can be installed and deleted in a pinch or better, use a tens operating system that is Linux distributions with a very high level of security, and works on the computer's RAM. 4. There is hardware that connects on the one hand to the computer, on the other hand to an on-key disk, and detects if the USB is writing to the computer - an expensive solution. 5. Like 6 but only in hardware configuration - USBGuard
  10. Hello everyone, if I got a USB disk drive on key, from a source I'm not sure about. Is it possible to safely connect it to a steaming computer to get viruses and spyware that are as a file or even at the hardware level? Of course there is the option not to connect at all, or push it to a computer in the municipal library and see what happens.
  11. Link to the video I am opening this thread because I saw that the computer is also sold in our country and there are people who want a pre-built computer and not build it themselves. Malek for those who do not want to see everything - pre-build computer - paid me $ 900 - did not get anything for free - i5-10400F core with 1660 super card without brand and 8 gigabytes - indicates favorably that the case is nice but medium airflow - Very small and non-standard power supply - Inferior steak ram - An unnamed graphics card of a large company, the heat sink does not touch the memory of the video card and does not cool it - Inferior motherboard that fits boards from many years ago, Non-standard physical size for motherboard - Inferior fan , (Whose screw is attached to the case.
  12. The question is whether in the alder leak poster from the 12th core series, there will also be an announcement of models from the X series, and if so whether they will be the 12th generation and will skip the 11th generation for the X series.
  13. No problem, happy to put my hand on such a processor in the future, just ask if Intel has anything in line in the next few months
  14. Plans to build a computer that will hold 2 powerful graphics cards (BMO 3090) for deep learning. Need enough lanes to support 2 * 16 Do you have an alternative in team blue to the processor + motherboard that will give good performance with two cards? Of course there is an option for team red (AMD)
  15. Hello forum members, when is the release of new intel x series processors expected? The last processors from the series came out at the end of 2019, will the next ones belong to the next 11 or 12 generation on us for good?
×
  • Create new ...

At the top of the news:

new on the site

Sony's Power Show

Sony's Power Show

The Japanese maker has made an impressive appearance for its PlayStation 5 console, with a large number of new gameplay videos and some special surprises