Content Sector5 - HWzone Forums
adplus-dvertising
Skip to content
  • Create an account

sector5

registered user
  • Number of messages

    47
  • Join

  • Recently visited

Anything published by sector5

  1. Thanks Tomer, I set back up as a router and turned off DHCP, now works both as an access point and as a switch.
  2. Aside from the difference of the switch, will there be a difference between the state of an access point and the state of a second router with DHCP disabled?
  3. Thanks Tomer, good job, the problem is that once I set the router as an access point, it eliminated the additional lan port
  4. Hello to the heavy guns of the forum. I have an old EDIMAX BR-6428nC router on their website it appears that it can be used as a router, as an access point and also increases range. My question is if I can also use it as a switch? And can I also simultaneously use it as an access point? I plan to get internet from moca that is supposed to give internet to a partner converter, and instead connect the internet from moca to the switch and from there to the converter, so I get more free ports what I want. Should you connect the cable coming out of the moca to the blue WAN input or to one of the yellow LAN inputs? There are a lot of champions in the forum, so thanks in advance
  5. Hello to all forum members, I have a laptop with Windows 10 and a raspberry pi running Linux. I'm on a public wifi library, and I want to transfer commands between devices using SSH, and open to external communication only the appropriate PORT for SSH. My problem is that by default, on a public network, each device cannot see the other devices on the network. If I run a test with nmap, I get that only my computer is on the network. Is it possible and how can a device be made visible? And how can I do the reverse process that I want to close the communication between them? Is there a way to make this connection even more secure than I suggested? (Note - I opened an identical thread a few days ago in the "Networks and Internet" forum and did not get an answer there, and on second thought this question is more appropriate for an IT forum, if one of the administrators wants to delete one of the threads, then delete the "Networks and Internet" discussion)
  6. Wrong, if I am on my home network, with the help of a first computer, I can use nmap and see all the devices in my home that are connected to the same network. Conversely, if I am on a public network, and I do the same command, I can see that the only computer connected to the network is my computer. This is a very important function, otherwise all computers will be visible. I need a way to bypass this artificial separation, to be "exposed" of my own free will * Of course I have the internal IP address of the two devices, but it is not possible to communicate between them, because of what I mentioned
  7. Hello all forum members, I have a laptop with Windows 10 and a raspberry pi computer running Linux ubuntu. I am on a public wifi library, and I want to transfer commands between devices using SSH, and open to external communication only the appropriate PORT for SSH. My problem is that by default, on a public network, each device cannot see the other devices on the network. Is it possible and how can a device be made visible? And how can I do the reverse process that I want to close the communication between them? Is there a way to make this connection even more secure than I suggested? Note - I opened the same discussion for this discussion in the IT forum, can you delete the discussion in this forum please, I think the question is more appropriate for the IT forum
  8. Thanks for the link, interesting and I knew the USB that destroyed the circuits, but I did not know that such a USB could be a "normal" size. I thought it must be a relatively large physical size to have room to accept. safety is number one priority
  9. From an in-depth study I did, for the future generation to watch and fear, I give some options I saw online: The options are in the worst case scenario that there is a hardware level and cannot be detected by an antivirus that scans files, Software if clicked. 1. The default solution - not to connect at all, but that's not why we came together. Use a buffered computer that is not connected to the Internet and does not contain important files. 2. Open the on-key disk itself, see if it is an official USB circuit or it is a circuit that contains a micro-controller like Arduino or teensy. 3. Use a computer with Linux, or better yet, Linux that works on a flsh card that can be installed and deleted in a pinch or better, use a tens operating system that is Linux distributions with a very high level of security, and works on the computer's RAM. 4. There is hardware that connects on the one hand to the computer, on the other hand to an on-key disk, and detects if the USB is writing to the computer - an expensive solution. 5. Like 6 but only in hardware configuration - USBGuard
  10. Hello everyone, if I got a USB disk drive on key, from a source I'm not sure about. Is it possible to safely connect it to a steaming computer to get viruses and spyware that are as a file or even at the hardware level? Of course there is the option not to connect at all, or push it to a computer in the municipal library and see what happens.
  11. Link to the video I am opening this thread because I saw that the computer is also sold in our country and there are people who want a pre-built computer and not build it themselves. Malek for those who do not want to see everything - pre-build computer - paid me $ 900 - did not get anything for free - i5-10400F core with 1660 super card without brand and 8 gigabytes - indicates favorably that the case is nice but medium airflow - Very small and non-standard power supply - Inferior steak ram - An unnamed graphics card of a large company, the heat sink does not touch the memory of the video card and does not cool it - Inferior motherboard that fits boards from many years ago, Non-standard physical size for motherboard - Inferior fan , (Whose screw is attached to the case.
  12. The question is whether in the alder leak poster from the 12th core series, there will also be an announcement of models from the X series, and if so whether they will be the 12th generation and will skip the 11th generation for the X series.
  13. No problem, happy to put my hand on such a processor in the future, just ask if Intel has anything in line in the next few months
  14. Plans to build a computer that will hold 2 powerful graphics cards (BMO 3090) for deep learning. Need enough lanes to support 2 * 16 Do you have an alternative in team blue to the processor + motherboard that will give good performance with two cards? Of course there is an option for team red (AMD)
  15. Hello forum members, when is the release of new intel x series processors expected? The last processors from the series came out at the end of 2019, will the next ones belong to the next 11 or 12 generation on us for good?
  16. From my use, it is the best browser I have used, in terms of convenience, security, real ad blocking including YouTube blocking and page loading speed. As for what avnyhow wrote in the comment, that's how I put it in bash and it did not work. From what I saw in a deeper scan on the net, probably because jetson nano uses an arm64 processor so this browser does not support such processors and a pity.
  17. Hello to all forum members, I use jetson nano with ubuntu 18.04.05 LTS operating system, I tried to install the brave browser according to the instructions of the company website (link https://brave.com/linux/) I entered the commands in terminal 1 to 1. After the last command I get the error: E: Unable to locate package brave-browser which is strange to me that after I enter the command sudo apt update it appears that there is a brave repository. I would be very happy for your help
  18. Thank you very much A-10, I was able to fix the problem. I share the solution for the following: I deleted the track pad driver (delete the keyboard driver is not enough), turned off the computer, pressed the continuous shutdown button for 30 seconds when the computer was off, stopped pressing and then restarted the computer.
  19. Thanks A-10, (my favorite plane), I will try the suggestions, I wanted to ask what is "Synaptics Driver"? Which appears in the links section
  20. Hello to all forum members, I have a Lenovo ideapad 110 laptop, the computer was perfectly fine and everything worked, a few days ago after turning on, the keyboard and trackpad stopped functioning, and the computer was loaded with an external mouse and keyboard only. Things I tried to do and to no avail: reatart update the keyboard drive. Delete the driver and restart defult settings recovery in bios Installing every possible driver with the help of easy driver I opened the computer, I made sure everything is connected properly. Replacing the internal drive to a drive with Windows 10 with a clean installation. All of these did not help and did not help, you are my last hope, thank you shows
  21. Hello to all forum members, I saw in a video review of gamers nexus about the 7th generation i11 processor that he used in a motherboard with 4 steaks of ram. On the Intel website the processor comes with Max # of Memory Channels equal to 2. I wanted to know if there must be a match between the number of ram statistics that appears on the Intel website and how many steaks can actually be attached to them. And what exactly "Max # of Memory Channels" says. Review link https://www.youtube.com/watch?v=3n0_UcBxnpk&ab_channel=GamersNexus
  22. This ad has ended

    • For sale
    • Used

    For sale from Rehovot, complete stationary computer, completely normal and quiet i7-2600 processor asus motherboard, small and compact package 4gb ram replaced thermal ointment without hard disks NIS 450, 100% correct with a commitment to send a message to WhatsApp

    450 ₪

  23. After a short research on information compression I came to the following insights: 1 Both zip format and rar format are lossless so in both we will not lose information regardless of parameters, which is in contrast to the 7zip format which loses information. 2. The difference in the parameters between normal, fast and everything else is: the encryption speed at the expense of the compression ratio, that faster compression and de-compression will result in a lower compression ratio and vice versa. 3. I will use the store option which is no compression at all, these only bind the files to the container. Hopefully this cluster will benefit those who follow me until the end of generations. You can lock
  24. Hello forum members, I need for a programming project, to cram a large volume to move upload it to colab and open it there. I have to keep the files without loss at all, the compression factor is not important to me, for my part the file volume will remain the same as their volume when they are not dosed, only they will be bound in zip or RAR format. I use winrar compression software, but I can also use any other suitable software you know or python code. I am attaching the image from winrar's software if anyone can help me choose the right parameters for compression without losing information at all.
×
  • Create new ...

At the top of the news:

new on the site