Subscribe to Packets Down Range
Hello all,You will receive a confirmation e-mail, so be on the lookout for that once you submit the form. If you don’t receive it, please check your junk mail or drop me a line. It will come from [email protected].
Mikrotik releases Apple Mac native App
With the release of Mikrotik Winbox version 4 we now have a Mac native application. This looks the same as the Windows and Linux versions. Way to go, Mikrotik! https://mikrotik.com/download
New podcasts coming soon
Picked up something new to get back into the podcasts.
Alta labs network at a glance
A quick post about the Alta Labs network view front eh iPhone app.
Amazon Tech Deal: Portable power
With a 600W AC inverter, 268Wh LiFePO4 battery pack, and 9 outlets, this is perfect for Tower crews on the job site. Many times, these crews are in remote areas, so you don’t want to fire up a generator or …
Amazon Prime Deal: Keep your stuff charged
If you are like me, you spend a lot of time in data centers. One challenge is keeping your phone charged. I like carrying a battery around so I don’t have to find outlets. https://amzn.to/4cBkhESINIU Portable Charger, Slimmest 10000mAh 5V/3A …
LibreNMS new install and all devices were in warn
I recently installed LibreNMS for monitoring some LTE clients. These clients reboot every morning at 3am. This is important to know. When I added them, they all showed up in a warning state. Some google searches said this was due …
/127s for IPv6 Point -To-Point links
/127’s for point-to-point links (RFC 6164) instead of /64’s https://datatracker.ietf.org/doc/html/rfc6164 [RFC4291] specifies that interface IDs for all unicast addresses, except those that start with the binary value 000, are required to be 64 bits long and to be constructed in …
Two-Factor authentication trends for modern security
In the ever-evolving landscape of cybersecurity, authentication is one of the most fundamental aspects of protecting digital identities. While traditional password-based authentication has been the norm for decades, it’s increasingly proving insufficient against sophisticated cyber threats. This is where Two-Factor …
Republish: Tales from the Data Center
Originally Published in 2015So, I have a very heartwarming story today related to the WISP industry. So this started back in March. A client was having issues with a circuit. The transport provider had so many failures in troubleshooting the …
Republish: Journey into Ham Radio and DMR
I originally published this article in 2015. For years I have hung out with “Hams” and been interested in the technology. Guys like ka8jil, w9sn, w9smj, w9cjo, and w9abh have all interested me in ham radio. I remember many years …