Barry Mitchell

Barry activity

0 Articles Written Last Month

0 0 0 0 0 0 0

Updated February 9th, 2023 by Barry Mitchell

Restart (Power Cycle) the PTI Falcon XT

To restart the “controller or the system”. Look for the PTI Falcon Enclosure. It is normally in the office or nearby. The staff member should have seen it around. Open the case – there is an orange connector that you need to disconnect for about 10 - 15 seconds. Then re-plug in the orange connector; the system will take roughly 1 minute to start up ...

0 min reading time
Updated February 28th, 2024 by Barry Mitchell

Mimon Managed Network

Mimon is a Mikrotik Monitoring and Management Layer to ensure that our clients networks are operating within normal parameters - and if not - raises notifications to ensure someone can deal with them promptly. This initial objective is to monitor and notify “the big 3” - Online Status (of WAN) Online Status (of 4G Backup) (if it is setup) Firmware a...

1 min reading time
Updated December 15th, 2023 by Barry Mitchell

RouterOS Azure Setup

Download the CHR VHDX image from MikroTik. Grab the latest Stable Version. Extract the VHDX into the c:\temp folder. Make sure that Hyper V Management Modules are installed - otherwise use a server with Hyper V. Run the following powershell command. Note that you will need to change the filename to match according to ve...

1 min reading time
Updated February 1st, 2023 by Barry Mitchell

LastPass - User Quick Start

Why use LastPass? Security starts with Unique and Strong Passwords - however in the 21st century with technology evolving so much faster than the natural world - we as human beings haven't yet evolved a memory to deal with this many strong and unique passwords! Therefore, it has become all too common practice to create one password - to rule them al...

3 min reading time
Updated February 1st, 2023 by Barry Mitchell

Two Factor Authentication (2FA)

What is Two Factor Authentication Passwords get broken every day - even the strong ones on occasion - and so is important to have a second layer of protection. This is where 2FA comes in. In the early days - this used to be a code which was sent as a text to your phone when you tried to do something - first being implemented by Banks to protect inte...

1 min reading time
Load More