Virtual Private Network(VPN)

VPNWhat Is a VPN and How Does It Work?

Simply put, a VPN creates a virtual encrypted tunnel between you and a remote server operated by a VPN service. All your internet traffic is routed through this tunnel, so your data is secure from prying eyes. Best of all, your computer appears to have the IP address of the VPN server, masking your identity and location.

When your data reaches the VPN server, it exits onto the public internet. If the site you’re heading to uses HTTPS to secure the connection, you’re still secure. But even if it was intercepted, it’s difficult to trace the data back to you, since it appears to be coming from the VPN server.

When the internet was first being pieced together, there wasn’t much thought given to security or privacy. At first it was just a bunch of shared computers at research institutions, and computing power so limited that any encryption could have made things extremely difficult. If anything, the focus was on openness, not defense.

Protect Yourself With a VPN

Today, most of have multiple devices that connect to the web that are vastly more powerful than the top computers of the early days. But the internet hasn’t made a lot of fundamental improvements. Consider that it is only in the past few years that HTTPS has become widespread.

This means that, unfortunately, it is up to individuals to protect themselves. Antivirus apps and password managers go a long way toward keeping you safer, but a VPN is a uniquely powerful tool that you should definitely have in your personal security toolkit, especially in today’s connected world. Whether you opt for a free service or even go all-in with an encrypted router, having some way to encrypt your internet traffic is critically important.

Due to recently outbreak of #COVID-19, It was safe to work from home instead of going to office. But how if your server is located in the office which is a few KM from you? You definite need the Virtual Private Network #VPN connection to your office so you can access it from anywhere in the world. Purchasing a hardware VPN router will cause you a lot of money since a lot of factory is closing down in china due to recently #outbreak. The best way is to setup a Software VPN in your server so you continue to #workfromhome Support Application:

(1) if you installing/host any of software like #sage #myob #autocount #payroll #sqlaccounting(client server based)


(2) if you have centralized file sharing Setup installation can be done remotely. You need to download the teamviewer for me to access your server and router.

Windows 7 End of Life: what should you do?

So, if you still use Windows 7, what should you do? There are a number of things we’d recommend you do in preparation for Windows 7 End of Life, and the first is to consider upgrading to a newer operating system.

While you have a number of choices when moving operating systems, for many people, the obvious and simplest option is to upgrade to Windows 10.

Windows 7 End of Life: upgrading to Windows 10

Upgrading from Windows 7 to Windows 10 has a number of benefits. For a start, because both operating systems are made by Microsoft the upgrade process is relatively easy, and in many cases you can keep your files on your PC.

This means you’ll experience the minimum of disruption when upgrading to Windows 10. Most programs you use will have been updated to work on Windows 10 as well, and the layout and interface are similar to Windows 7, so you shouldn’t find it too hard to adjust.

If you want to upgrade to Windows 10, then you can buy a copy, download the installation file and run it to start the process.

It’s nice and easy, and you’ll be asked if you want to keep your files. However, we’d recommend that you still back up all your files and folders just in case.

While upgrading from Windows 7 to Windows 10 is the easiest solution, there are reasons why it won’t be right for some people. For a start, you’ll need to buy a Windows 10 license, and these can be quite expensive – if you were hoping to manage Windows 7’s End of Life without spending any money, this isn’t the way to do it.

Also, while Microsoft has done an admirable job of making Windows 10 able to run on older hardware, it’s still a modern operating system that might struggle to work well on your old Windows 7 machine.

Here’s the minimum specification for Windows 10:

  • Processor: 1 gigahertz (GHz) or faster processor or SoC.
  • RAM: 1 gigabyte (GB) for 32-bit or 2 GB for 64-bit.
  • Hard disk space: 16 GB for 32-bit OS 20 GB for 64-bit OS.
  • Graphics card: DirectX 9 or later with WDDM 1.0 driver.
  • Display: 800 x 600 resolution

If your Windows 7 machine doesn’t meet these specifications you won’t be able to run Windows 10 – and even if your machine just meets the requirements, Windows 10 won’t run that well. We’d recommend at least a 2GHz dual-core processor, 4GB of RAM (8GB ideally) and a 160GB hard drive for Windows 10 to run well.

If you don’t have the required hardware, but still want to upgrade to Windows 10, then you could upgrade your PC. This is a cost-effective approach, as you may only need to upgrade a few components on your computer to enable it to run Windows 10. Of course, upgrading your PC can be rather fiddly, and there’s only so much you can upgrade before it becomes easier (and more cost-effective) to buy a new PC.

Buying a new machine is another option, and Windows 7’s End of Life could be a good excuse to spoil yourself with a new and more powerful PC, with Windows 10 installed. You can quite easily move your files and folders to your new machine using an external hard drive.

One last thing – don’t be tempted to save a bit of money and upgrade to Windows 8. Although it’s more recent than Windows 7, it’s not going to be too long before that version too enters its End of Life stage, so you’re better off saving further hassle down the line by getting the newer (and let’s be fair, better) Windows 10.

Fixing “No DKIM keys saved for this domain” in Office365

Sometimes a newly added domain in Microsoft EOP will not let you enable DKIM from the web user interface. The only workaround I know of is to prepare the domain using PowerShell.

To connect a PS session to O365, I use the following script, ripped straight from Microsoft’s documentation:


$UserCredential = Get-Credential

$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri -Credential $UserCredential -Authentication Basic -AllowRedirection

Import-PSSession $Session -DisableNameChecking

After waiting for an eternity for the necessary stuff to load, run the following command – and wait another eternity for it to finish:

New-DkimSigningConfig -DomainName “” -Enabled $true CNAME CNAME

Tip Fight Ramsonware

The nefarious ransomware business model has turned out to be a lucrative industry for criminals. Over the years its ill repute has made law enforcement team up with international agencies to identify and bring down scam operators.

Most of the ransomware attacks that have taken place in the past have been linked to poor protection practices by employees.

There are a few dos and don’ts when it comes to ransomware.

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi.


What are the differences between SSD and HDD?

The main difference between a solid state drive and a hard disk drive is that data is stored on either a small, flash memory chip or a large, spinning memory disk, but this difference plays out across a number of variables.

SSD vs HDD storage capacity

Solid state drives are advantageous because the memory microchips are much smaller and more compact than large hard drive disks.
As technology advances, data becomes more compressed and SSDs continue to shrink in size, allowing laptops to become thinner, lighter, and easier to transport.
However, while an SSD might be smaller than an HDD, that also means they could be limited in their storage capacity. HDDs offer massive amounts of storage space, making them a leading choice for large-scale servers.
How much storage do you need? Most average users would be fine with 250 to 300 gigabytes (GB). To put it in perspective, you could store about 30,000 average-sized photos or songs with 250GB.
If you plan to download movies or triple-A (AAA) games, you might want to upgrade to a hard drive with 500GB or even 1TB.
That being said, as cloud-based storage alternatives continue to expand and more software converts to online web applications, less importance is placed on internal memory space.

SSD vs. HDD processing speed

HDD/SATA drives come in a number of different speeds, which affects how quickly your data is relayed. This gives you the flexibility to choose as much or as little processing power you need.
SSD controllers also vary in speed, but they’re almost always faster than HDDs since they use flash memory and do not depend on a mechanical arm to physically read and write data.
Boot up times are significantly quicker for SSDs as well, requiring only about 10 seconds, whereas SATA drives could take up to 30 seconds or more.
Even on lower-end SDD models, the time it takes to open files is much less than an HDD due to the high-speed, interconnected flash memory chips.

SSD vs. HDD application performance

Because SSD PCs read files much faster, they’ll run your applications more smoothly and reliably. This is especially true for multi-media users who frequently rely on video editing or digital design software that requires rapid rendering.
According to PC Mag, SSDs boot faster, launch and run apps faster, and transfer files faster [2]. Whether you’re using your computer for fun, school, or business, the extra speed may be the difference between finishing on time and failing.
If you’re running an intense workload and need your computer to execute tasks without a hitch, you probably don’t want to be hobbled by a mechanical hard drive disk and should opt for an SDD.
Those with a short queue depth and greater need for storage will likely be fine operating on an HDD.

SSD vs. HDD gaming experience

SSDs cut down on boot times and load large files faster, but you won’t notice much of an in-game difference between that and an HDD.
Your gaming experience is more dependent on your graphics card and random access memory (RAM), which differs from your hard drive memory in that it’s stored only temporarily, not permanently.
It’s worth mentioning that HDDs are susceptible to fragmentation, and frequent gaming can increase your risk of a fragmented disk.
Fragmentation refers to little bits of data spread out across the memory disk. It’s almost like tearing up tiny pieces of paper and tossing them into the wind, attempting to sort them and then decipher the distorted message.
It forces your computer to work harder to read a single file than it would if the data had loaded in a long, continuous line which will definitely cause it to be slower. A fragmented hard drive can also lead to random crashes or freezes, among a slew of other problems, affecting not only your gaming but your overall PC performance.

SSD vs. HDD energy consumption

SSDs use up to one-half to one-third less power than HDDs do (usually 2 to 3 watts versus 6 to 7 watts). If you’re running multiple HDD workstations in an office space, this is a difference you’d definitely notice on an electricity bill.
Comparing different laptop hard drives, an SSD battery will last two to three times longer than a laptop using a SATA interface would.
When energy-efficiency is at the top of your priority list, a solid state drive is usually the better choice.

SSD vs. HDD durability

HDDs use spinning disks to read and write data, so they perform better in stationary locations where the moving parts are less vulnerable to jostling.
The nature of a solid state drive is less fragile and more likely to protect your data from shock damage in the event of an accidental drop.
Those who are prone to unexpected tumbles should opt for a more durable SSD It lacks the delicately moving parts that could potentially be bumped askew.

Pros and cons of an SSD over an HDD

To sum it up, an HDD/SATA drive shines in terms of storage capacity. It’s also more approachable in price, costing on average 80% less per GB than the cost of an SSD drive [3].
That said, solid state drives may be worth the price jump depending on your budget and computing needs. They’re usually much more reliable in terms of speed, performance, energy efficiency, and durability.
As an added note, a laptop or desktop PC with a hard SATA drive is much noisier due to the constantly whirring, spinning disk, which also emits more heat than an SSD, meaning fans will be running more often as well.
HDDs offer massive amounts of memory space, but the extra storage capacity typically comes with added weight. Comfort, convenience, and price are all factors worth considering when selecting an SSD vs. HDD.

Bottom line: SSD or HDD?

The HDD has been around for some 60 to 80 years. Almost a decade ago in 2008, SATA hard disks reached near market saturation and were utilized as the standard in as much as 99 percent of drives [4].
Today, SSDs have taken a great deal of the market share due to their superior performance, even despite the uptick in price.
SATA drives still have their purpose, though. They allow you to store massive amounts of information relatively inexpensively. It’s not uncommon to use a SATA interface to expand memory and store data such as pictures, documents, and music libraries while the actual OS is stored on an SSD.
It all comes down to understanding your storage needs, speed requirements, and how you intend to use your computer. Balancing out these different factors will help you find the right hard drive solution.
Whether you choose a traditional SATA hard disk drive or opt for a newer solid state drive, keep in mind that they’re both capable of failure. It’s critical to take the time to back up your hard drive using an external device, cloud-based service, or alternative means.
Now that you know the key differences between the different types of hard drives, you should feel less stressed and more confident in your next computer purchase. With the right backup and security measures in place, you’ll be able to enjoy your investment for years on end.

Inbound vs. outbound firewall rules

Inbound rules: These are to do with other things accessing your computer. If you are running a Web Server on your computer then you will have to tell the Firewall that outsiders are allowed to connect to it.
Outbound rules: These are so that you can let some programs use the Internet, and Block others. You will want to let your Web Browser (Internet Explorer, Firefox, Safari, Chrome, Opera…) have access to the Internet, so you will tell Windows Firewall that it’s allowed.

Using outbound firewalls

It’s actually rare to see an outbound firewall used because of the complexities that it introduces into the network. Oftentimes, outbound firewalls interrupt application traffic, disrupt business workflows and get users upset unless close attention has been paid to configuring the firewall in just such a way to enable everything to work.

However, in certain cases, businesses might need to filter outbound traffic. For example, an outbound firewall can be beneficial in very locked down environments that control network behavior down to the host level. Alternately, certain data loss prevention technologies may need an outbound firewall to protect specific information on the host.

How to know if laptop motherboard is bad

Many people usually blames bad motherboard if they experience problems with their laptop. But how do you make certain it’s a laptop motherboard issue and not any other component? The thing is, there are other issues caused by a specific component that may be misconstrued as a motherboard failure. To avoid misdiagnosing a problem, make sure that you read through this brief material.

Laptop Motherboard failure is one of the most challenging issues any user or technician can face simply because there are a number of variables to consider. To get down to the bottom of the issue, a technician will usually have to eliminate several software and hardware causes. Usually, there are not many signs to come by to help you diagnose a motherboard failure. A motherboard either works or not, nothing in between. Other peripherals like fans and hard drives may still work even if the motherboard is dead but your computer may still not work at all.  If you think motherboard is to blame, make sure that you consider the items below.

Physically damaged parts. The first thing that you want to do, especially if you haven’t opened a computer yet, is to physically check the motherboard. This will allow you to examine if there is any bloated or damaged capacitor causing the issue like the ones identified in the figure below.

Leaking or bloated capacitors are usually products of overheating, material defect, or plain old aging. If you can see a capacitor that’s about to blow, you can assume that the reason for your motherboard problem.

Look out for unusual burning odor. Another telltale sign of a motherboard problem is burning smell. Most of the time, a really strong burning smell is an indication that an overheated component. Sometimes, plugging in an incompatible component can lead to overheating or failure so if you’ve installed any component prior to noticing the problem, make sure to remove it right away. You cannot just install a component to any motherboard so make sure that you consider checking compatibility first. Plugging in an incompatible RAM or video card for example may lead to severe problems so as to damage the motherboard permanently.

Random lock ups or freezing issues. If you’ve noticed that your computer has been freezing up lately, the first thing that you should do to troubleshoot it is to see if software is to blame. However, if you’ve already ruled out all software factors, the next good thing to do is to consider other hardware variables, including the possibility that the motherboard may be failing.

Blue screen of death. Getting a blue screen of death on your computer does not automatically means a motherboard issue. At lot of times, the main reason may be a bad driver or hardware failure. If you can, take note of the error message, especially the error code which looks like this one (0x000000(0x000000,0x000000,0x000000,0x000000). Once you have the code, use Google to research it to see if it says something about motherboard failure.

Other symptoms can also appear such as the ones below although there’s a chance that a totally different malfunction may be causing them. Below are the additional warning signs that you should watch out for:

  • Some peripherals appear to stop working for a few seconds.
  • Computer taking a long time to boot up.
  • Motherboard does not do POST or Power On Self Test.

Reasons why a motherboard fails

Now that you’ve confirmed that your computer’s motherboard has failed, you may be wondering what causes such trouble. Well, below are some of the common reasons why a motherboard can stop working:

  • Overheating.
  • Fan failure. Dust can accumulate very fast in fans causing them to fail. Make sure that you clean the fans inside the tower at least once every year.
  • Too much dust in the system. Dust, like heat, can shorten component lifespan and the motherboard in general. Try your best to clean the inside of your computer regularly.
  • Smoke.
  • Accidental drop that subjects components to unnecessary shock.
  • Aging.
  • Power surges or unstable voltage.


What is RSSI and what does it mean for a WiFi network?

RSSI, or “Received Signal Strength Indicator,” is a measurement of how well your device can hear a signal from an access point or router. It’s a value that is useful for determining if you have enough signal to get a good wireless connection.

Note: Because an RSSI value is pulled from the client device’s WiFi card (hence “received” signal strength), it is not the same as transmit power from a router or AP.

RSSI vs dBm

dBm and RSSI are different units of measurement that both represent the same thing: signal strength. The difference is that RSSI is a relative index, while dBm is an absolute number representing power levels in mW (milliwatts).

RSSI is a term used to measure the relative quality of a received signal to a client device, but has no absolute value. The IEEE 802.11 standard (a big book of documentation for manufacturing WiFi equipment) specifies that RSSI can be on a scale of 0 to up to 255 and that each chipset manufacturer can define their own “RSSI_Max” value. Cisco, for example, uses a 0-100 scale, while Atheros uses 0-60. It’s all up to the manufacturer (which is why RSSI is a relative index), but you can infer that the higher the RSSI value is, the better the signal is.

Since RSSI varies greatly between chipset manufacturers, MetaGeek software uses a more standardized, absolute measure of signal strength: received signal power, which is measured in decibels, or dBm on a logarithmic scale. There’s a lot of math we could get into, but basically, the closer to 0 dBm, the better the signal is.

To help leverage your signal strength measurement most effectively so you can make channel planning decisions,inSSIDer Plus displays signal strength in two ways.

Acceptable Signal Strengths

Signal Strength TL;DR Required for
-30 dBm Amazing Max achievable signal strength. The client can only be a few feet from the AP to achieve this. Not typical or desirable in the real world. N/A
-67 dBm Very Good Minimum signal strength for applications that require very reliable, timely delivery of data packets. VoIP/VoWiFi, streaming video
-70 dBm Okay Minimum signal strength for reliable packet delivery. Email, web
-80 dBm Not Good Minimum signal strength for basic connectivity. Packet delivery may be unreliable. N/A
-90 dBm Unusable Approaching or drowning in the noise floor. Any functionality is highly unlikely. N/A

What if I have an acceptable signal strength but I’m still having problems?

If you’ve already checked your signal strength using a WiFi scanning app like inSSIDer Plus and concluded that you have acceptable WiFi signal strength, then interference may be to blame. Your computer’s WiFi adapter can help you see some types of interference, but for finding non-WiFi interferers, you’ll need a spectrum analysis tool like Wi-Spy.

NVMe vs M.2 vs SATA

One of the bigger breakthroughs for PC hardware in modern memory has been the solid state drive. And with data transfer speeds many multiples of traditional 7200 RPM and even 10,000 RPM drives, it’s easy to see why. Not only are boot and shut down speeds much faster with SSDs, but all aspects of the system are sped up as well. We highly recommend them. But what about NVMe SSDs, how do they differ from standard SATA drives? And do all M.2 drives classify as NVMe? Read on while we break down the differences between NVMe vs. M.2 vs. SATA.

What is NVMe?

NVMe vs. M.2 vs. SATA
The Samsung 960 Pro is was fastest NVMe drive on the market…until the 970 Pro replaced it.

First, a quick note about SSDs – they’re fast. So fast in fact, their limiting factor is not their own hardware, but rather the SATA III connection that hard drives have traditionally used. Enter NVMe. Standing for “Non-Volatile Memory Express,” NVMe is an open standard developed to allow modern SSDs to operate at the read/write speeds their flash memory is capable of. Essentially, it allows flash memory to operate as an SSD directly through the PCIe interface rather than going through SATA and being limited by the slower SATA speeds.  Put another way, it’s a description of the bus the component uses to communicate with the PC, not a new type of flash memory. It is also unrelated to the form factor, which is why NVMe drives can come in both M.2 or PCIe card form factors. With both form factors, the component is connecting electrically to the PC via PCIe rather than SATA.

Are all M.2 drives NVMe?

No. Remember, M.2 is just the form factor. M.2 drives can come in SATA versions (like the Crucial MX500 M.2 for example) and NVMe versions (like the Samsung 970 Pro), which describes the bus they use to electrically communicate with the other PC components. SATA M.2 SSD drives and 2.5” SATA SSDs actually operate at virtually identical spec. NVMe M.2’s on the other hand, definitely do not, as we’re about to discuss.

How does NVMe speed compare to SATA?

Modern motherboards use SATA III which maxes out at a throughput of 600MB/s (or 300MB/s for SATA II, in which case, it’s time to upgrade). Via that connection, most SSDs will provide Read/Write speeds in the neighborhood of 530/500 MB/s. For comparison, a 7200 RPM SATA drive manages around 100MB/s depending on age, condition, and level of fragmentation. NVMe drives, on the other hand, provide write speeds as high as 3500MB/s. That’s 7x over SATA SSDs!

How to Delete EFI System Partition in Windows 10/8.1/8/7/XP/Vista

This page talks about what is an EFI system partition, why you cannot delete EFI partition in Disk Management and how to delete or remove EFI system partition in Windows 10/8/7/XP/Vista with Diskpart command line.

Usually, you can easily delete a partition in Disk Management. But sometimes, you can’t remove EFI system partition in Windows 10/8.1/8/7/XP/Vista because “Delete Volume” feature is grayed out. And you may encounter the similar situation when you trying to delete OEM partition, recovery partitions, system reserved partition. This page will talk about what is an EFI system partition and how to remove, deleted or format EFI system partition in Windows 10/8.1/8/7/XP/Vista.

What is an EFI system partition and why you cannot delete it?

Usually, when you successfully install Windows OS on a GPT disk of your computer, an EFI system partition (ESP for short) will be created. But what is an EFI system partition?

what is an EFI partition

Deleting EFI system partition will cause installed systems unbootable. So, EFI system partition is usually protected and locked by the Windows operating systems to prevent and avoid accidental deletion of these partitions. That’s why you can’t delete EFI partition using Disk Management tool. But in some special situation, for example, when you uninstalling Windows system, you might want to remove EFI system partition to free up some disk space. At this moment, how can you delete EFI system partition? Actually, there are two ways to do this job.  And in case something goes wrong after the operation, we recommend you to clone EFI partition to make a backup.

Method 1. How to delete EFI partition with Diskpart

Step 1. Hit “Windows Key + R to open the run dialogue box, enter “diskpart” and click “OK” to open a black command prompt window. (run with administrator)

Step 2. Type “list disk” to display all the disks of your computer. Type “select disk n” to identify which disk you need to work with. Here n stands for the disk letter.

Step 3. Type “list partition” to display all the volumes on the hard drive. Type “select partition n” to identify which partition you want to remove. Here n stands for the volume letter.

Step 4. type clean and it will erase everything. then you should re-initialized the disk

Site to Site VPN with Draytek

model: Vigor 2925 and Vigor 2926

HQ: (dynamic ip address)
a) put in the peer id  (both must same on HQ and Branch)
b) IKE pre-shared key (both must same on HQ and Branch)
1. go to vpn and remote access -> lan to lan
2. create a profile – choose dial in, enable profile
Branch: (dynamic ip address)
a) pre-shared key (both must same on HQ and Branch)
b) put in the dynamic dns from hq
c)after click advanced, select aggressive mode and put the local ID (both must same on HQ and Branch)
click advanced

Port Forward in Maxis MA131

Maxis Business fiber will having issue to setup on other router if the user want to use their phone (free line). they cannot attach to the TM modem as per this equipment is not own by maxis. If you want to use the phone line from maxis you must use their router MA131. Problem come if you want to do port forwarding when you have different firewall router which will need. what we do is to do double port forwarding.


below is the example of the port forwarding in maxis router.

as you can see the ip actually is the firewall router behind this maxis router.


below is the firewall router. the wan ip for this router are configure as static ip receive from the maxis router. which is

what you to do is double open the port for both router.

DSX-600 CableAnalyzer

Essential certification of copper, twisted pair structured cabling from Cat 3 / Class C through Cat 6A / Class EA

The DSX-600 from Fluke Networks provides essential Cat 6A and Class EA Copper Certification featuring ten second test times and advanced user interface. Manage jobs and testers from any smart device over Wi-Fi with LinkWare™ Live. Features legendary Fluke Networks reliability backed by worldwide support.

  • Cat 6A and Class EA Copper Certification
  • Includes Channel Measurement Adapters; Optional rugged Permanent Link Adapters with removable test plug available
  • 10 second Cat 6A test time
  • ProjX™ Management System makes test setup fast and foolproof
  • HDTDX and HDTDR diagnostics pinpoint fault location
  • Integrates with LinkWare™ Live to manage jobs and testers from any smart device.
  • Quickly and easily create professional custom PDF reports with LinkWare™ PC.

Unique Features

  • The DSX-600 enables users to accomplish more than ever before by accelerating every step of the testing process
  • LinkWare Live cloud service lets the Project Manager remotely set up the testers, monitor job progress and even location from any smart device
  • ProjX™ management system eases tasks from initial set-up of a job to system acceptance. It eliminates redundant steps, and ensures that all tests are completed correctly the first time, and every time
  • Taptive™ user interface puts advanced data analysis and easy set-up and operation at the fingertips of technicians of all skill levels
  • LinkWare PC management software provides unmatched analysis of test results and professional test reports


  • TIA – Category 3, 5, 5e, 6, 6A per TIA 568-C.2 or TIA-1005
  • ISO/IEC – Class C and D, E, EA certification per ISO/IEC 11801:2002 and amendments
  • IEEE 802.3 – 10BASE-T, 100BASE-TX, 1000BASE-T, 10GBASE-T


  • Nine second Cat 6/Class E and 10 second Cat 6A/Class EA test time contributes to the fastest way to gain certification
  • Graphically displays the source of failures, the DSX-600 HDTDR and HDTDX algorithms provide quick, easy-to-understand directions to identify the point of failure (distance from the tester).
  • Manage up to 12,000 Cat 6A test results with full graphics
  • Capacitive touchscreen allows quick tester setup with easily selectable cable types, standards and testing parameters

ProjX™ Management System Manages Complex Jobs with Ease

Manage up to 12,000 Cat 6A test results with full graphics

Managing the testing of multiple jobs with multiple teams, testers, and requirements is time consuming and a source of errors. Increasingly larger jobs make project organization more important than ever. The new ProjX management system on the DSX-600 CableAnalyzer provides individual project files for all job specific details to be saved under a simple name, eliminating the need to re-enter job specific details after starting a project. This minimizes set-up errors or lost files when switching from one job to another or utilizing multiple testers on a single job. In addition, it provides test results by cable ID, merges any changes without duplicates and defaults to the last copper or fiber module installed. ProjX management system provides real time status to completion on each job with a 0-100% scale and gives the operator the option to isolate any test requiring a second look and helps to assure nothing is overlooked. The “Fix Later” selection creates a punch list or automatic to do list for correcting any workmanship issues. ProjX enables project managers and crew leaders to be truly efficient.

Performs with Unsurpassed Speed

Ten second Cat 6A test time and the fastest way to submit your certification results

No tester offers so much speed for so many tests. Complete copper certification to Cat 6A in 10 seconds . Quickly get a Pass or Fail result and easily review individual test parameters by value or drill into specific area on a graph.

LinkWare™ PC Cable Test Management Software

Leveraging the popular and multi-featured LinkWare PC management software application, DSX-600 users can easily access the ProjX management system data, generate reports, and upgrade the software in their testers. Project Managers have full capabilities to manage workflow and consolidate test results. Users can provide the finishing touch by adding their company logo to the report and offer it unaltered to their customers for system acceptance purposes. Keep your business tools simple, no matter which Fluke Networks copper or fiber tester you are using, LinkWare PC is the software package that reports it all.

Now with LinkWare PC stats, the new automated statistical report option, you can move above and beyond the page-per-link report and see your entire cabling infrastructure. It analyzes and transforms LinkWare PC test results data into charts and diagrams that reveal your cabling plant performance; this report summarizes your entire cabling infrastructure in a compact, graphical format that makes it easy to verify margins and to spot anomalies.

LinkWare™ Live Test Results Management Service

LinkWare Live is a cloud-based service that lets you manage certification jobs anytime, anywhere, with anyone on any device.  With LinkWare Live, you can:

  • Keep track of every test on every job. Get an overview of every project from any smart device. Drill down to each individual test. Instantly receive notification of incorrect test setting or cable IDs.
  • Get it right the first time. Define cable IDs and test settings from your PC or tablet.
  • Keep your testers up to date. Standards can change without notice, and an out-of-date test report can mean hours of re-testing. LinkWare Live automatically ensures your testers are running the latest.
  • Stop wasting time and gas driving testers back to the office. Upload your test results straight from the job site to LinkWare Live over Wi-Fi. Then download them automatically to the right job for fast report generation with LinkWare PC.
  • Avoid Project Delays. Track the last used location and monitor the status of all testers to ensure they are always calibrated and running the latest firmware*

How to change the listening port for Remote Desktop

To change the port that Remote Desktop listens on, follow these steps.

Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:

322756 How to back up and restore the registry in Windows
  1. Start Registry Editor.
  2. Locate and then click the following registry subkey:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp\PortNumber
  3. On the Edit menu, click Modify, and then click Decimal.
  4. Type the new port number, and then click OK.
  5. Quit Registry Editor.
  6. Restart the computer.

Note When you try to connect to this computer by using the Remote Desktop connection, you must type the new port. Maybe you have to set the firewall to allow the new port number before you connect to this computer by using the Remote Desktop connection.

How to prevent remote users from shutting down/rebooting the Windows

Open secpol.msc from the Run menu to open “Local Security Policy”, from there navigate to Security Settings -> Local Policies -> User Rights Assignment. In that subfolder find the option for Shut down the system and add the group named Console Logon to the list then remove the other groups from the list.

Multiple port forwarding setup


On router 2, you need to open the port assign to the wan port  of router 1. for example cctv use 37777 tcp

on router 1, you need to open the port assign to the DVR. for example cctv use 37777 tcp.


How to Determine Your Network Cabling & Wiring Needs

The conveyance media you choose for your structured cabling implementation is determined by many factors, the most important of which are your current bandwidth needs, your network environment, your expected future bandwidth requirements and your budget. This article will address each of these primary concerns in an attempt to help you identify which cabling solution will best meet your specific requirements.

Determining Your Current Network Bandwidth Needs

Your primary concern in determining the type of cabling to use is your network’s current bandwidth requirements. This figure can vary greatly based on the size of the network (i.e. the number of workstations connected to the network). A small network of 15 workstations will generally have much lower bandwidth requirements than a network that needs to support 100 workstations. Future growth should also be factored when considering network size. If your company is expecting to double the number of employees over the next two years, then you can expect your network bandwidth needs to increase accordingly. To complicate matters further, you must also factor in the type and volume of the data traffic that your network will be supporting. For example, a small multimedia and graphic design firm with only 10 workstations will likely have much greater bandwidth requirements than a law firm consisting of 25 workstations. Again, this is due primarily to the type and volume of the data one can expect in each work environment: a single user transferring a 5-minute high definition video across the network can easily consume more bandwidth than 20 users opening MS Word and Excel files.

So how do you accurately determine your network bandwidth requirements?

There are several ways to analyze network traffic, but the best and most accurate method is to utilize a tool called a network analyzer. Among the simplest and most ubiquitous of these tools is a utility that is built into all flavors of Windows servers called Network Monitor. The Network Monitor utility gives detailed insight into traffic on a network segment and can detail broadcast traffic and specific packets transmitted to or from a machine. There are also several other third-party products such as Ethereal (free), as well commercial analyzers such as Network General Fast Ethernet Sniffer, Cinco NetXRay, AG Group EtherPeek, Novell LANalyzer for Windows, and Intel LANDesk Traffic Analyst among many others. It is important to note than when using a network analyzer to monitor your current network’s bandwidth usage, that you sample data over the course of several days (or even weeks), and that you do so throughout different times of the day. Doing this will ensure that you make the most accurate assessment of your network’s bandwidth requirements.

Your Network Environment

Your network environment plays a large part in determining the best type of cabling you should use. While optical fiber offers the fastest possible bandwidth and is the best medium for “future proofing” your network, certain environments are ill suited toward fiber optic installation. Unlike twisted copper mediums like Cat5e or Cat6, optical fiber is prone to transmission problems due to dirt and scratches on the fiber. This can be typical of dirty or dusty mechanical closets, equipment closets, and any rooms that are not clean or friendly to fiber technology. In such cases, twisted copper solutions might be the best way to go. Alternatively, certain environments cause problems with twisted copper mediums. Although Cat5e and Cat6 have much improved noise immunity than their twisted copper predecessors, they are susceptible to high RF (radio frequency) and EMI (electromagnetic interference). Hospitals for example, have tremendous RF interference problems over twisted pair cabling. A Cat5e or Cat6 cable running alongside a CAT scanner or NMR (nuclear magnetic resonance) scanner would be rendered virtually useless due to RF interference. In such environments, optical fiber is the ideal solution as it is all but immune to such interference.

Future Bandwidth Requirements

It is rare that people think to factor in the growth of a company, or the launching of new products and services when estimating future bandwidth requirements. But, failure to make an accurate assessment of future bandwidth requirements can end up costing a lot of money. Unfortunately, estimating future bandwidth is both complex and often speculative. As an example, it might seem that doubling the number of employees in a company would result in a doubling of the network bandwidth demand. Rarely is it so straightforward, however. Consider that several of the new employees might be multimedia authors, who generally have much higher bandwidth requirements. Also consider that bringing on several new sales people means bringing on the back-and-forth communication between those sales people and all their customers. Perhaps the sales department has decided to host an in-house, web-based CRM implementation — this could result in an increase in bandwidth requirements that are that are far out of proportion to the rest of the users on the network. Because of such factors as these, it is important that a network administrator have knowledge of the future plans for a business when planning a structured cabling implementation. Generally speaking, it is far less costly to “future proof” a structured cabling implementation than it is to replace the existing cabling once it becomes apparent that it is not sufficient to meet the demands of the network.

Your Budget

While working within a budget is certainly something one should consider, it must be understood that the difference in costs between Cat5e, Cat6 and optical fiber is insignificant compared to the costs involved in not using the correct conveyance media for current and future network requirements. The old adage that “it’s better to do it right the first time” certainly holds true when planning your network infrastructure. Not doing it right the first time could cost your company far more than it saved by choosing an older technology or less expensive conveyance media, not to mention that not choosing the correct media could cripple a network and bring about the wrath of it’s users. Because of this, current and future bandwidth requirements, as well as an understanding of your network environment should play a far more important role than cost in determining which type of cabling is best suited for your needs.


Five of the Best Web Browsing Privacy Programs

In today’s time and age, one has to take safety and security as some of their top priorities. You know how whistleblower Edward Snowden revealed that the National Security Agency (NSA) accesses the central servers of major companies like Microsoft, Google, Yahoo, AOL, Skype, Apple, Facebook, YouTube, and others.

You should always think that this agency (and several others) analyze all electronic communication devices, files, and everything else that they contain and store. You cannot tell the government to exclude you from their surveillance list. What you should do instead is to control your own web privacy.

Because of the above-mentioned revelation from Snowden, you should never underestimate the power web browsing privacy programs. You should always use cryptography and encryption software in order to keep things as private as possible.

What Encryption Is

When you encrypt data, you can send sensitive information to authorized individuals via the Internet. It features a formula that render the information unreadable or inaccessible to people who do not have the “code” or the “key.” Proper encryptions will allow only you and those who have the code or key to access the data.

Here are five of the best web privacy and encryption software you should use.

  1. AdBlock Plus

One of the most commonly sought-after browser extensions, this open source community project addresses a lot of the annoying issues that come with intrusive and sensitive-data-stealing online ads. Its motto, which is: “We want to make the Internet better for everyone. Purging bad ads is a good start,” aptly describes what they can do for their users.

  1. EasyList & EasyPrivacy

Created specifically for AdBlock users, these subscriptions contain filter lists that, when activated, automatically eradicates unwanted ads and unauthorized tracking from all your web activities. With these two enabled, you no longer have to worry about web bugs, information collectors, and tracking scripts. In other words, you can ensure your personal data, specifically the sensitive ones, remain private and secure.

  1. Ghostery

Ghostery, a web monitoring tool, turns you into a detective by having more than 1200 trackers containing information about annoying and data-stealing ad networks, web publishers, and data providers among many other companies that want to be privy of your web activities, Internet behavior, and other net-concerned habits.

  1. Tor Browser

Another open source tool, Tor makes your Internet activities anonymous. It comes bundled with a browser that you can use for Linux, Windows, and Mac operating systems without having to install any other unnecessary software. Its primary functions are to prevent anyone from gaining knowledge of the sites Internet users visit, prevent websites from learning your physical location, and provide you with access to blocked or banned websites.

  1. HTTPS Everywhere

With HTTPS Everywhere, you can make sure every website you enter and visit starts with https://. This means that all sites you visit go into an encrypted mode. You can use for both Mozilla Firefox and Google Chrome (BETA).


Do not allow your websites and all web-related activities to become privacy concerns. Start using these programs and extensions now.


Factory Reset OS

Below is some guideline of the shortcut key to perform the factory reset for following brand of PC/Laptop

Acer – Alt + F10

Asus – F9

Dell/Alienware – F8

HP – F11

Lenovo – F11

MSI – F3

Samsung – F4

Sony – F10

Remote IT Support

10 reasons why use remote IT support

1. Efficiency

There’s no way around the fact that if you have to drive to every client, you’re spending precious time (time that could be billable) in your car. Instead of a fifteen to thirty minute drive, why not make that a fifteen second dial of a phone number? You’ll be getting more done, faster, thereby you’ll be billing more hours and working far more efficiently. Yes, you’ll have the downtime of getting clients connected to you – but most often that is a fairly painless process (there are of course those clients that simply don’t get what “open your web browser” means).

2. Cost effective

Doing remote support means you’re not using gas or adding wear and tear to your vehicle. It also means fewer chances of accidents while driving (so cheaper insurance rates). Remote support can also save your budget in many, varied ways: Eating lunch at home, less budget spent on clothing, and even less money spent using your smartphone data plan to look up information for the job at hand.

3. Green

Again we return to vehicle usage. When doing remote support, you’re not driving. When not driving, you’re not adding to the greenhouse gas issue. Having a greener overall footprint can help you in many ways. First, you can find possible tax credits. Second, your reputation for being a conscientious business will precede you – thus helping to win you over more clients. But this issue shouldn’t necessarily be about winning over clients…right?

4. Client-friendly

How many times have you stepped into a job to find the clients to be less than happy you are on site? Whether it’s due to bad timing, impossible scheduling, or what – there are instances when you arriving at a client location is less than ideal. When that occasion arises, it can quickly escalate into you not getting much work done (or worse, working under a pressure you don’t need). Avoid this by offering remote support for those clients that would rather hear you, than see you.

5. Multi-tasking

When you work remotely, you can do as many jobs as you can juggle. I have, on more than one occasion, had six remote sessions going at one time. If each of those appointments takes an hour to resolve, that’s six billable hours taken care of in one hour. This type of situation, of course, must be handled with care. You cannot bill a client for an hour when the job would have taken significantly less time had you not been double-dipping. If handled properly,  remote support enables you to get much more done in less time.

6 After hours

Remote support also allows you to work after hours. This, of course, is not for everyone. But there are certain situations (such as Windows updates – especially on servers) where working after hours is the only way to get something done. For those times, you’ll be glad you offer remote support. I have run into numerous instances where a client had a problem but didn’t have time for me to work on said problem until they were out of the office. Remote support – perfect solution.

7. Work from home

I have to confess…I’m a big fan. Why? Why not? Working in my PJs, working at my own pace, working within a safe and known environment…what is there not to like? I always find, when I’m working within a comfortable environment, I work better. Injecting remote services into your business model is the easiest means of making the work-from-home model work for you.

8. Fast response

The difference between hopping in your car and dialing a phone number could be crucial. This is especially true when you’re dealing with failing machines or clients that demand immediate turn around. Your clients will greatly appreciate the super fast contact times and you will be glad for the quick resolution of issues.

9. Controlled environment

Like working in your most comfortable pajamas, working in an environment you can control will go a long, long way to helping you get your work done as efficiently as possible. When working on site, there is no way you can control the variables thrown your way. This is also very much dependent upon the client. If you’ve ever done support for a retail client, you know trying to get anything done inside the business (especially during business hours), is nearly impossible. When working remotely, you don’t have to worry about customers or clients getting in your way.

10. Less intrusive

There are clients that simply don’t want you there. There are also clients you don’t want to be around. Doing remote work avoids this trap all together. You won’t have to feel like you are in the way of someone else doing their job or feeling unwanted (which certainly does nothing to make a job more efficient). A lot of clients greatly appreciate it when you can get their technology back up and running smoothly from behind the magic curtain.

Not every job can be handled remotely. Considering remote work depends upon a solid network connection, and it should be pretty obvious there will be times when you will simply have to be on site. But when you have the choice, working remotely sure makes the job easier in many ways. If you have the opportunity to add remote service to your menu, give it a try…both you and your clients will be glad you made the addition.


Window Life Cycle

Every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it’s no longer supported. Knowing key dates in this lifecycle helps you make informed decisions about when to upgrade or make other changes to your software.

End of support

End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. This is the time to make sure you have the latest available update or service pack installed. Without Microsoft support, you will no longer receive security updates that can help protect your PC from harmful viruses, spyware, and other malicious software that can steal your personal information. For more information go to Microsoft Support Lifecycle.

 Client operating systems  Latest update or service pack  End of mainstream support  End of extended support
  Windows XP  Service Pack 3  April 14, 2009  April 8, 2014
  Windows Vista  Service Pack 2  April 10, 2012  April 11, 2017
  Windows 7*  Service Pack 1  January 13, 2015  January 14, 2020
  Windows 8  Windows 8.1  January 9, 2018  January 10, 2023
Windows 10, released in July 2015**  N/A  October 13, 2020  October 14, 2025



QNAP Launches QTS-Android Combo NAS TAS-168/268


Taipei, Taiwan, December 1, 2015 – QNAP® Systems, Inc. today announced the world’s first and only QTS-Android Combo NAS – TAS-168 and TAS-268, which support QTS & Android dual systems. Both systems share the same storage database, allowing users to simultaneously access media files and documents from QTS and Android. With a compact mini-tower design, the TAS-168/268 comfortably fits in homes and small offices/workspaces. Coupled with up to terabytes of storage capacity and 4K (H.265 & H.264) HDMI-out, the TAS-168/268 is the optimal budget-friendly multimedia NAS with unlimited app applications for modern digital lifestyles.

“The QNAP QTS-Android Combo NAS TAS-168/268 is an unprecedented network storage center for file storage, backup, remote access and diverse Android applications,” said Hanz Sung, product manager of QNAP. “Users can enjoy video streams, use apps and manage files on a big HDMI display instead of sliding and tapping on a small screen. The TAS-168/268 makes the personal cloud experience more flexible and enjoyable.”

Powered by an ARM® v7 1.1GHz dual-core processor with 2GB DDR3 RAM, the TAS-168/268 supports terabytes of storage capacity and is designed as a media NAS optimized for home use. Users can simply connect a keyboard, mouse and HDMI display to directly manage, edit and play files stored on the TAS-168/268 via Android, without needing an additional PC. Using TAS is extremely easy as the Androidexperience is the TAS experience, and users can freely control their multimedia experience with the bundled remote control.

With the TAS-168/268, users can download various videos and educational apps from Google Play on Android, or install QNAP apps and access other app marketplaces from Qmarket. Whether enjoying 4K (H.265 & H.264) videos, streaming videos from Android apps, using apps as e-learning tools or centrally managing files, the QTS-Android Combo NAS TAS-168/268 is a great choice for enjoying infinite applications and fun.

In addition to working independently, the TAS-168/268 can also be used with another QNAP NAS to handle more applications. QTS RTRR/rsync functions helps back up files on the TAS-168/268 to another NAS. With the Android interface displayed via HDMI, users can use apps like Qphoto, Qmusic and Qvideo to browse multimedia files on another QNAP NAS, or install the Vmobile app to monitor IP cameras from the Surveillance Station of another NAS. With another NAS using QTS 4.2, users can activate the remote connection function in File Station to manage share folders in the TAS-168/268 through FTP, WebDAV, and CIFS/SMB.

With various VPN apps available in Google Play, users can stream media contents from blocked sites, or create a secure OpenVPN tunnel between the TAS and another NAS to process remote backup tasks. The TAS-168/268 is also a great file center for synchronization. Users can synchronize their files across multiple connected devices using Qsync or use Cloud Drive Sync to synchronize files to Google Driveand Dropbox®.

The TAS-168/268 provides an easy way to create a secure personal cloud which alleviates the storage limitations and data security concerns of public cloud services. myQNAPcloud provides multiple remote access services for users to conveniently access, manage and share multimedia files on the TAS-168/268 from anywhere with a web browser. Users can also access and browse files on TAS-168/268 by using QNAP mobile apps including Qfile, Qphoto, Qmusic, Qvideo and Qmanager.

Key specifications of new models

  • TAS-168:1-bay mini-tower NAS
  • TAS-268:2-bay mini-tower NAS

ARM® v7 1.1GHz dual-core processor, 2GB DDR3 RAM; 3.5” SATA 3Gbps HDD; 1 x USB 3.0 port; 4 x USB 2.0 port; 1 x Gigabit LAN port; 1 x HDMI output

adapt from

Average Temperature of The Processor

The appropriate operating temperature of your processor depends on its manufacturer, top clock speed, where the sensor is located, and what programs it is currently running. However, this document should give you a general idea of what temperatures are acceptable under certain conditions.
The majority of today’s desktop processors should not exceed temperatures of 35°C and most run between 21°-32°C. Below is a chart listing many types of processors and their average temperatures. Keep in mind, this is only to give our users a general idea of what their processor should be running at. If you believe your computer is running too hot, you can skip to the bottom of this document for information about the safe temperature range for your processor.

Processors Average temperature
AMD A6 45°C – 57°C
AMD A10 50°C – 60°C
AMD Athlon 85°C – 95°C
AMD Athlon 64 45°C – 60°C
AMD Athlon 64 X2 45°C – 55°C
AMD Athlon 64 Mobile 80°C – 90°C
AMD Athlon FX 45°C – 60°C
AMD Athlon II X4 50°C – 60°C
AMD Athlon MP 85°C – 95°C
AMD Athlon XP 80°C – 90°C
AMD Duron 85°C – 95°C
AMD K5 60°C – 70°C
AMD K6 60°C – 70°C
AMD K6 Mobile 75°C – 85°C
AMD K7 Thunderbird 70°C – 95°C
AMD Opteron 65°C – 71°C
AMD Phenom II X6 45°C – 55°C
AMD Phenom X3 50°C – 60°C
AMD Phenom X4 50°C – 60°C
AMD Sempron 85°C – 95°C
Intel Celeron 67°C – 85°C
Intel Core 2 Duo 45°C – 55°C
Intel Core i3 50°C – 60°C
Intel Core i5 50°C – 62°C
Intel Core i7 50°C – 65°C
Intel Pentium II 65°C – 75°C
Intel Pentium III 60°C – 85°C
Intel Pentium 4 45°C – 65°C
Intel Pentium Mobile 70°C – 85°C
Intel Pentium Pro 75°C – 85°C

Sync your clock with the domain controller

The quickest way to synchronise your clock with the domain time, open a command prompt window and type:

To force a computer to synchronize its time with a specific computer, send the following command:



NET TIME \\<IP Address> /SET /Y

Where <MACHINENAME> is the domain controller computer name, or IP address.