This update is only applicable to North America devices.
The release notes for 1.10 are:
¤ Fix the issue with DS-Lite
¤ Fix the security issue with Samba
¤ Fix the issue with the mail server
¤ Fix the issue with DLNA
¤ Support the latest hidden page
¤ Support PPPoE Passthrough
I just don’t know what is latest hidden page.
Continue reading “Update D-Link DIR-850L router firmware to 1.10B08”
I just update the system through yum update command.
After that, I reboot the VPS, then, lost the connection to this VPS and web site.
- Can not access the web site on it from browser.
- Can not access the VPS through ssh
- Can not access the VPS through Serial Console.
I create a ticket on servermania support. The support team replied in 20 minutes.
After two conversation between Andrew and me.
He told me that the problem is:
The yum update had broken the iprouting on the OS which caused the venet to not come up.
Continue reading “Site is down due to the network issue”
An eCommerce company needs to have a reliable web host to ensure that its customers can access the site at all times. If your site is down, it means that your business is temporarily out of commission. Your customers could decide that they are fed up with your unreliable site and go to the competition to make their purchases.
Another issue that you will run into is having a site that loads slowly. You don’t want your site to load slowly because the search engines will penalize your site. Additionally, no one wants to sit at their computer for more than a minute waiting for their page to load or their credit card information to be processed.
A good web host will make sure that your site is secure at all times. Using eCommerce web hosting from Network Solutions makes it easy to create secured connections when your customers want to make a purchase. If a customer has their information tampered with or stolen while a transaction is in progress, your company could be liable for any damages that the customer incurs.
It is critical that you pick the right web host for your eCommerce site. This is because you need a host that will keep your site up as much as possible while providing the security that it needs to keep your customers happy.
For testing purpose, I need a CentOS 6.3. So I download CentOS DVD image. Installed it in VirtualBox as web server.
Note: The network of guest system is using bridged, which allow the guest access internet, and also allow the computer in Lan can access the guest system.
The installation is simple, no problem. I would like to share my experience I met later.
1) Prepare the network
Only lo, or loopback is active. I can not access Internet from the CentOS.
eth0 is not showing when I run ifconfig command.
Continue reading “Prepare CentOS 6.3 within VirtualBox”
I have three routers in house. One is provided by ISP, Telus. It is 2 in 1, including modem and router. The second router is Buffalo WZR-HP-G300NH. It is placed beside Telus device. There two are connected with lan cable. Both are in the living room ground floor. The third router is located at basement. It is Buffalo WZR0HP-G300NH2. It is connected to the second router with wireless connection as client bridged.
I drew a reference layout.
Now, let me describe the network problem. It bothered me for two months.
I have a PC, Windows 7, in the basement, connect the router 3 with wire connection.
Normally I have no problem to working on this PC. Web browsing, online gaming, streaming video.
Until last month, I tried to install a Centos server. The server can not do update, can not wget remote files.
In the server terminal window, I can ping domain and get the IP address of Google.com, but I can not traceroute path to Google.com. It said network is unreachable, something like that.
When I tracert my host from Windows, the error looks like below:
Continue reading “Fixed a strange network problem”
I installed vnStat on one of my VPS. After about 20 days tracking, I ask the support of Burst.net.
What is the figures of past 20 days they monitored?
The support email me the report.
Month: 2012 Jul
Day Incoming Outgoing Total
12 47.65 MB 731.46 MB 779.11 MB
13 37.52 MB 593.08 MB 630.6 MB
14 84.81 MB 615.17 MB 699.98 MB
15 45.95 MB 658.43 MB 704.37 MB
16 48.44 MB 743.58 MB 792.02 MB
17 44.29 MB 647.25 MB 691.55 MB
18 40.19 MB 652.6 MB 692.78 MB
19 114.48 MB 642.12 MB 756.6 MB
20 47.86 MB 709.87 MB 757.73 MB
21 46.71 MB 687.91 MB 734.62 MB
22 55.72 MB 756.85 MB 812.57 MB
23 63.55 MB 927.75 MB 991.31 MB
24 96.13 MB 1.19 GB 1.29 GB
25 55.6 MB 676.65 MB 732.25 MB
26 35.63 MB 564.44 MB 600.08 MB
27 57.1 MB 994.59 MB 1.03 GB
28 50.95 MB 754.29 MB 805.24 MB
29 35.43 MB 637.68 MB 673.11 MB
30 36.95 MB 629.61 MB 666.55 MB
31 55.68 MB 610.07 MB 665.75 MB
The figure of my own records are as below:
Continue reading “vnStat is a good network traffic monitor”
We are heavily relaying on the network, or Internet.
Now I would like to share how I connect all my devices in my house.
Internet service is provided by Shaw. It is the only choice in my area.
Coaxial cable connect the Modem from the wall. Then connect Modem and my Router A by network cable.
Router A is the heart of my network.
It provide wired connection to following devices:
Media Player – Asus O!Play
Network Storage – DLink DNS323, 3.5TB, FTP, File sharing, and BT.
Voip Box A – iTalkBB, provide local phone service.
Voip Box B – SPA-2002, Long Distance Call Service.
Router A also provide Wireless connection to following devices with MAC address filter. Only allowed MAC address can connect it.
Desktop A, for my daughter Grace
Desktop B, for my wife, Vivian and daughter, Gloria,
Cellphone A – LG Optimus One
Cellphone B – LG Shine Plus
DS lite – with a replacement case, still working.
Kindle Keyboard with Wifi
Router A has a wireless connection with Router B. Router B works as bridge.
Router B wired connects to Desktop C
Router B is also working as a printer server by connecting Laser printer with USB port.
Actually, Router A has a Gigabit Switch to extent the ports. Router A has 4 Lan ports only, by connect Switch to it, it can connect 7 devices.
Continue reading “Home Network”
Twitter is one of the best social network tools. I use it every day. So, follow me on Twitter
I will share my experience from Web site development to cooking skills. And also, you will read my post from my Twitter.
You are always welcome to follow me.
I will follow you back if you follow me.
To be frank, I use Twitter almost every minute. If not, must be every hour, I check my time line.
Continue reading “Follow me on Twitter”
Let’s discuss the most important eight steps to protect your WiFi connection.
1) Don’t use default SSID
2) Change the SSID to something that does not identity your business or location.
3) Use a boring name for SSID, something like network5 or ntdile09ldk.
4) Change access point’s default IP and admin password.
5) Use WPA rather than WEP.
6) Change encryption key often, once or twice every month.
7) Restrict network connections to network clients with specified MAC addresses.
8) Do not broadcast your SSID.
And the last not the least step is to use wired connection if possible.
I use D-Link WBR-1310 as a sample to show you the 6 steps to protect your home wireless network.
1. Enable Encryption
* WEP (Wired Equivalent Protection) 64-bit and 128-bit: WEP is an old wireless encryption standard. Never use WEP encryption, which can be hacked within seconds.
* WPA (Wi-Fi Protected Access): WPA-PSK is also refered as WPA-Personal. This is a new version of wireless encryption standard and more secure than WEP. Most of the wireless adapters on your laptop will support WPA.
* WPA2: This is the latest wireless encryption standard that provides the best encryption. Always use WPA2, if both your wireless router and laptop wireless adapter supports it.
SETUP > WIRELESS SETTINGS >, WEP part. It has WPA2 too.
2. Change the SSID name
SSID (Service Set Identifier) refers to the name of your wireless connection, that you see on the “Available Wireless Connections” list from your laptop while connecting.
SETUP > WIRELESS SETTINGS >, Wireless Network Settings part.
3. Disable SSID broadcast
You can avoid your wireless name from getting displayed on “Available Wireless Connections” on all your neighbors laptop.
Check the picture above. You can choose the “Enable Hidden Wireless”.
Continue reading “6 Steps to Secure Your Home Wireless Network”