May 08, 2025

Free Webinar: Common Wi-Fi Design Mistakes


Join Ekahau's insightful webinar, "Common Wi-Fi Design Mistakes," where industry experts delve into the frequent pitfalls encountered in wireless network planning and deployment. This session is tailored for IT professionals, network engineers, and Wi-Fi enthusiasts aiming to enhance their network's performance and reliability.  



Thursday, May 8, 2025 | 12:00 – 1:00 pm ET


Participants will learn to avoid common errors that can lead to suboptimal Wi-Fi experiences.



Don't miss this opportunity to learn from seasoned professionals and elevate your Wi-Fi design skills. Whether you're designing networks for offices, educational institutions, or large venues, this webinar will provide you with the tools and insights needed to ensure robust and efficient wireless connectivity. 



Register now to secure your spot and take a significant step towards mastering Wi-Fi network design.


https://www.ekahau.com/webinars/common-wi-fi-design-mistakes/

May 05, 2025

Ubiquiti Edgerouter Reset and Setup


 The best part about my career is that I’m always getting exposed to different equipment and scenarios.


For example in the past 10 years I have worked with the following vendors equipment; Cisco, Motorola, Ubiquiti, Nokia, Netally, Fluke Networks, Profitap, Solarwinds, all flavors of windows/linux, Tp-Link, peplink, and many , many more.


My point is that I don’t have an issue with starting a new contract and jumping right in to help out. If involves learning something new, then that’s just part of the job. Since I have a fairly wide and extensive background, I usually pick up any basics pretty fast and can add some value along the way.


Sure, there are times when I ‘learn on my time’, but that’s the way it is when you are self employed.


As I did some research about setting up Ubiquiti routers, a lot of it was out of date and some conflicting information so I thought it would be a good idea to do a short video.

In this video I walk you through how to reset and configure a router from scratch.




May 04, 2025

Sentimental Sundays - The Sharp MZ-80K


 The Sharp MZ-80K, released in 1979, was one of the earliest personal computers produced by Sharp Corporation, a Japanese electronics company. It was part of the MZ (Microcomputer Zilog) series, which began with the MZ-80K in 1978. The MZ-80C was designed as an all-in-one system, featuring a built-in monochrome monitor, a cassette tape drive for storage, and a full keyboard, making it a compact and user-friendly option for hobbyists and early computer enthusiasts. Powered by a Zilog Z80 microprocessor running at 2 MHz, it came with 20 KB of RAM (expandable to 48 KB) and 4 KB of ROM, which included a BASIC interpreter. The MZ series was particularly popular in Japan and parts of Europe, competing with contemporaries like the Commodore PET and TRS-80, though it never achieved the same global recognition as some of its rivals.

ree

One notable aspect of the MZ-80C’s history is its role in Sharp’s broader strategy to establish itself in the burgeoning personal computer market. Unlike many computers of the era that required separate peripherals, the MZ-80C’s integrated design was a selling point, reflecting Sharp’s expertise in consumer electronics. It also featured a unique "clean computer" architecture, where the system avoided using a traditional operating system in favor of a simple monitor program in ROM, allowing users to load software directly from cassette tapes. This design choice made it accessible for beginners but limited its flexibility compared to systems with disk drives or more advanced OS capabilities. Over time, Sharp expanded the MZ line with models like the MZ-80B and MZ-700, gradually incorporating more advanced features like color graphics and floppy disk support.


Trivia-wise, the MZ-80C has a few quirky claims to fame. It was one of the first computers to ship with a built-in piezo speaker, capable of producing rudimentary sound effects, which delighted early programmers experimenting with audio in games and demos. Another fun fact is that its keyboard layout included katakana characters alongside standard Latin ones, catering to its Japanese audience and reflecting the cultural context of its primary market. Additionally, the MZ-80C gained a small cult following among retro computing enthusiasts due to its distinctive design and the challenge of programming within its constraints—some even credit it with inspiring early Japanese game developers who later worked on more famous platforms. Today, surviving units are prized collectibles, often showcased at vintage tech exhibitions.



May 02, 2025

The Importance of Properly Configuring Preferences in Wireshark

 


Wireshark, a powerful open-source network protocol analyzer available at www.wireshark.org, is an essential tool for network administrators, security professionals, and developers. Its ability to capture and analyze network traffic in real-time makes it invaluable for troubleshooting, monitoring, and securing networks. However, to harness its full potential, users must configure Wireshark’s preferences correctly. Properly setting preferences ensures that the tool operates efficiently, displays relevant data clearly, and aligns with the user’s specific needs, whether they are debugging a network issue or investigating a security breach.

ree

Configuring preferences in Wireshark begins with tailoring the interface and capture settings to suit the user’s environment. For instance, users can customize the layout of the main window, such as adjusting column displays to prioritize critical packet details like source, destination, or protocol. Capture filter settings are equally important, allowing users to focus on specific traffic types, such as HTTP or TCP, while excluding irrelevant data. By defining these filters upfront, users reduce the volume of captured packets, making analysis more manageable and less resource-intensive. Additionally, preferences like time display formats—whether relative, absolute, or UTC—can significantly impact how easily users interpret packet timelines, especially in time-sensitive debugging scenarios.


Beyond interface and capture settings, Wireshark’s protocol preferences allow for deeper customization to enhance analysis accuracy. For example, enabling or disabling certain protocol dissectors can prevent misinterpretation of packets in complex network environments. Users can also configure Wireshark to resolve network names or port numbers, which simplifies identifying devices and services. Incorrect or default protocol settings may lead to cluttered outputs or missed anomalies, particularly when analyzing encrypted traffic or non-standard protocols. By fine-tuning these preferences, users ensure Wireshark provides clear, actionable insights tailored to their specific network context.

Ultimately, neglecting to configure Wireshark’s preferences can lead to inefficiencies, overwhelming data outputs, or even misdiagnosed network issues. Taking the time to explore and adjust settings—whether for display, filtering, or protocol analysis—empowers users to work smarter, not harder. Wireshark’s flexibility is one of its greatest strengths, but it requires thoughtful configuration to unlock its full potential.


By visiting www.wireshark.org and leveraging its documentation and community resources, users can learn to optimize preferences, making their network analysis faster, more accurate, and more effective.



May 01, 2025

Free - Wi-Fi Performance and Security Playbook from Ekahau

 

If you’re serious about building fast, secure, and reliable Wi-Fi networks, you need the right strategy — and Ekahau has you covered. Their Wi-Fi Performance & Security Playbook is packed with expert insights, real-world best practices, and actionable steps to ensure your wireless networks meet today’s growing demands. 

Whether you're optimizing an existing setup or designing a new one from scratch, this guide offers a clear roadmap to boost performance while locking down security vulnerabilities.

Don't leave your Wi-Fi to chance. Download the Wi-Fi Performance & Security Playbook from Ekahau today and get a proven framework that helps you deliver flawless connectivity for every device, user, and application. 

Stay ahead of evolving threats and ever-increasing bandwidth needs — get your free copy now by clicking the above image.

Popular post in the past 30 days