Academic_Ad1931

joined 11 months ago
[–] [email protected] 1 points 10 months ago

Its actually quite easy, most modern firewalls have application control/internet service lists that make it a menial task to block such things.

Had a mild debate on Reddit the other day with someone who was harping on about VPN obfuscation behind able to bypass detection on firewalls (I think that was their point, anyway) but its hogwash, VPNs regardless of their marketing are quite detectable and quite blockable.

As for why, that's up to the usage policy of the company offering the service. We block such things for productivity sake and for our required commitment to KCSIE, I suspect Libraries, etc. will also have to conform in some aspects.

[–] [email protected] 1 points 10 months ago (1 children)

We use these to span 800m line of sight to run 2 x CCTV cameras.

Ubiquiti NSM5 NanoStation M5 airMax Outdoor 5Ghz 16dBi WiFi 4 Point-to-Point PtP Link Kit, Pre-Configured (150Mbps N) (broadbandbuyer.com)

The PtP hooks up to a PoE switch on the other side that also powers the 2 cameras.

[–] [email protected] 1 points 10 months ago

The issue you will likely have is 5Ghz coverage is not as vast as 2.4Ghz, so for the repeater to be close enough to the initial hub to connect on 5Ghz and provide a usable 2.4Ghz band it will just overlap the signal and you won't gain much or any coverage.

PowerLine adapter with Wi-Fi on the slave?

TL-WPA8630P KIT | AV1300 Gigabit Passthrough Powerline ac Wi-Fi Kit | TP-Link United Kingdom

[–] [email protected] 2 points 10 months ago

Yes, when talking to you they will have another tab open to Hacker Typer where they will be furiously hacking your mainframe. /s

u/ElevenNotes has given you a suitably proper answer, I'm just here for the fun.