This guide shows the basic requirements and steps to build a WISP (Wireless Internet Service Provider) using Ubiquiti AirMax devices; suggested equipments and examples are intended for a system of up to 400 subscribers based on a single Base Station and “centrally managed” from the principal router. It covers the following themes: basic legal and commercial requirements, required equipments and basic services on the Base Station, clients’ configuration and general recommendations for starters.
Tag Archives: howto
Connect Two Wireless Router Wirelessly
You can setup a wireless connection between two routers only so that it will link a wireless network to a wired network allowing you to bridge two networks with different infrastructure. You can find wireless access points products that offer either a “bridge” mode or a “repeater” mode. In this post I’m going to explain three popular open source choices that can be used for setting up a wireless bridge.
via HowTo: Connect Two Wireless Router Wirelessly ( Bridge ).
Engineers Build Supercomputer Using Raspberry Pi, Lego
The team is wanting to see “Iridis-Pi” become an inspiration for students to enable them “to apply high-performance computing and data handling techniques to tackle complex engineering and scientific challenges.”
via Engineers Build Supercomputer Using Raspberry Pi, Lego – ParityNews.com: …Because Technology Matters.
Howto is here.
Steps to make a Raspberry Pi Supercomputer
The steps to make a Raspberry Pi supercomputer can be downloaded here: Raspberry Pi Supercomputer (PDF).
You can also follow the steps here Raspberry Pi Supercomputer (html).
Using the Google Nexus 7 Tablet as a Phone, For Free (+ a Privacy Hint)
In short, yes, even though the N7 doesn’t obviously have phone-related user interfaces, you can use the N7 as a phone for both outgoing and incoming calls via VoIP, and this can be accomplished completely for free via Google Voice accounts.
The fairly easy steps:
Obtain and install the GrooVe IP Lite (GIPL) app via Google Play. This version is free and has everything you need for this situation. You still might wish to purchase the full version for $5 to support the fine work of the developer.
via Lauren Weinstein’s Blog: Using the Google Nexus 7 Tablet as a Phone, For Free (+ a Privacy Hint).
Raising the dead: Can a regular person repair a damaged hard drive?
This is a story of my efforts to repair the drive myself, my research into the question of whether or not users can repair modern hard drives, and the results of my efforts. If your drive is still detected in BIOS, you may be able to use software tools to retrieve your data. Here, we’re going to focus exclusively on hardware-related failures, and what your options are.
via Raising the dead: Can a regular person repair a damaged hard drive? | ExtremeTech.
Surf the internet for more than two minutes, and you’ll find people who recommend you do one of the following things:
- Stick your hard drive in the freezer
- Pop your hard drive into the oven
- Give it a few taps with a hammer or rubber mallet
LOL. I have been desparate to try the freezer trick a couple of times without luck.
How to Repair a Corrupt MBR and boot into Linux
If you don’t have a Fedora CD, then you need not despair. You can also repair the boot loader using one of the numerous live CDs available.
via How to Repair a Corrupt MBR and boot into Linux | All about Linux.
The chroot command is featured in this howto article.
The technologist’s guide to troubleshooting hardware
PCs are always getting simpler and more streamlined, but there are still a lot of different parts to most of them, which means that there is a lot more that can go wrong with them. We’ll go through potential problems component by component, matching symptoms to issues and telling you the best way to inform your friend on the other end of the phone. Pay attention here, because many of these symptoms and procedures are also going to be useful when troubleshooting Macs, phones, and tablets.
via The technologist’s guide to troubleshooting hardware | Ars Technica.
A closer look into the RSA SecureID software token
Widespread use of smart phones by employees to perform work related activities has introduced the idea of using these devices as an authentication token. As an example of such attempts, RSA SecureID software tokens are available for iPhone, Nokia and the Windows platforms. Obviously, mobile phones would not be able to provide the level of tamper-resistance that hardware tokens would, but I was interested to know how easy/hard it could be for a potential attacker to clone RSA SecureID software tokens. I used the Windows version of the RSA SecurID Software Token for Microsoft Windows version 4.10 for my analysis and discovered the following issues:
Raspberry Pi Review & Initial How-To Setup Guide
We received a Model B ($35), which is powered by a Broadcom BCM2835 SoC that includes a 700MHz ARM1176JZF-S CPU core, 256MB of RAM and a Broadcom VideoCore IV GPU with OpenGL ES 2.0 that supports 1080p at 30FPS as well as H.264 and MPEG-4 high-profile decoding for smooth Blu-ray playback. Connectivity includes two USB ports, Ethernet, HDMI, RCA video, an SD card slot, a 3.5mm audio jack and two rows of 13 General Purpose Input/Output (GPIO) pins for further expansion.
via Raspberry Pi Review & Initial How-To Setup Guide – TechSpot Reviews.
Once the process is finished, a popup will notify you that the write was successful. Close the box, exit the application, unmount the SD card from your PC and attach it to the Raspberry Pi. Assuming everything went well, you’re ready to fire the device up. The first time the computer boots from the SD card it will automatically configure itself. It will then reboot and load up once again to the login screen.
The default username for Debian is pi and the password is raspberry. You can then load the LXDE desktop environment by entering startx. A few moments later, the desktop will load up as below:
.epub eBooks Tutorial – Part 1: Format Your Source Content
Speaking of CSS, that’s where you want to do all your styling. It’s the preferred way to stylize things in both XHTML and the ePub standard. (There are a very few reader programs out there that won’t recognize CSS. Mot of them do by now though, and if you keep the HTML to the basics, the book will still be readable if the reader program doesn’t recognize CSS.
via .epub eBooks Tutorial – Part 1: Format Your Source Content.