This 3G hotspot user guide provides instructions on safely using the device and connecting Wi-Fi enabled devices to share an internet connection. It explains how to power on the device, check signal and battery status via LED indicators, connect to the device via USB or Wi-Fi, and log into the configuration page. The guide also gives a quick overview of setting up the wireless network name and security settings during initial device setup.
Mini Zipato drive with energy measurement allows the variation in your interior lighting to create a pleasant atmosphere in your home and also help you to reduce your energy consumption. Actually it is able to transmit the instantaneous power consumption (W) and cumulative (KWh) of equipment attached to it.
Mini Zipato drive with energy measurement allows the variation in your interior lighting to create a pleasant atmosphere in your home and also help you to reduce your energy consumption. Actually it is able to transmit the instantaneous power consumption (W) and cumulative (KWh) of equipment attached to it.
o Positioning and Tracking Cars by SMS
o Emergency Alarm, Power Off Alarm
o Movement Alert, Over Speed Alert
o Geo-fence to restrict the car move within a district.
o Restart the vehicle by SMS.
Fitness Tracker Bracelet H11 – A Personal Workout Partner you can depend uponThinkRacePakistan
ThinkRace Technology brings you the H11, a smart fitness tracker bracelet you can depend upon. When it comes to health, the heart matters the most. The H11 smart fitness tracker is equipped with a state-of-the-art heart rate monitor for real time heart rate detection and precise blood pressure analysis.
For more information about our products and services visit :
http://www.thinkrace.pk/fitness-bracelet-h11/
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. Safety Precautions
Read the safety precautions carefully to ensure the correct and safe use of your wireless
device.
Do not switch on your device when the device use is prohibited or when
the device use may cause interference or danger.
Follow the rules or regulations in hospitals and health care facilities.
Switch off your device near medical apparatus.
Switch off your device in an aircraft. The device may cause interference
to control signals of the aircraft.
Switch off your device near high-precision electronic devices. The
device may affect the performance of these devices.
Do not attempt to disassemble your device or its accessories. Only
qualified personnel are allowed to service or repair the device.
Do not place your device or its accessories in containers with strong
electromagnetic field.
Do not place magnetic storage media near your device. Radiation from
the device may erase the information stored on them.
Do not put your device in a high-temperature place or use it in a place
with flammable gas such as a gas station.
Keep your device and its accessories away from children. Do not allow
children to use your device without guidance.
Use approved batteries and chargers only to avoid explosion.
Observe the laws or regulations on device use. Respect others’ privacy
and legal rights when using your device.
It is recommended that the equipment only be used in the environment where temperature
is between 0℃ and 50℃ and humidity is between 10% to 90%. Keep the equipment in
the environment where temperature is between -10℃ and 70℃ or humidity is between
10% to 90%.
1
4. 1. Overview
3G Hotspot provides a simple way to use 3G connect to the Internet with any
Wi-Fi-enabled device and to fulfill needs of sharing your internet connection during
outside home.
1.1 Introduction
Indicator Description
1
2
3
4
Fig 1.1
The device is equipped with four LED status indicators (Fig 1.1) including:
Indicator Status Description
SIM error, PIN verification failed or no
Keep Red
signal.
Keep Yellow Weak signal
Keep Green Good signal
1. Signal
Keep Blue Roaming and good signal
Blue and flashing slowly Roaming but poor signal
power off, normal working mode or
Unlit
Sleeping Mode
3
5. Keep Red no network
Green and flashing fast dialling
Green and flashing slowly registering to 2G network
Keep Green connected to 2G network
2. Network Blue and flashing slowly registering to 3G network
Keep Blue connected to 3G network
Yellow and flashing fast dial failed
power off, normal working mode or
Unlit
Sleeping Mode
Keep Green normal battery power
Keep Yellow low battery power
very low battery power and will power
Keep Red
3. Power/ off automatically
Connect Green and flashing slowly charging
Blue and breathing Normal working mode
Yellow and breathing Sleeping Mode
Unlit power off
Blue and flashing slowly Wi-Fi on and transmit data
Green and flashing fast WPS connection is building
4. WIFI/WPS Keep Green for 5 Seconds WPS connection built
Keep Red for 5 Seconds WPS connection failed to build
Unlit Wi-Fi off
During updating, all the four indicators keep red until update finished.
Button Description
3 2 1
Fig 1.2
1. Power/Connect
Press and hold the power button more than 4 seconds to power on/off.
Short press the power button (less than 2 seconds) to connect/disconnect.
4
6. When the power indicator is blue and breathing, short press it (less than 2
seconds) to light all indicators.
2. Wi-Fi/WPS
Turn on/off Wi-Fi or WPS.
When Wi-Fi is on, press and hold this button until the WIFI/WPS Indicator go out
to turn off Wi-Fi.
When Wi-Fi is off, press and hold this button for about 2 seconds until the
WIFI/WPS Indicator start flashing to activate WPS.
When Wi-Fi is off, short press this button to turn on Wi-Fi.
3. Reset
Short press the button until all the 4 LED indicators become blue and flashing and
the device will reboot.
Press and hold more than 6 seconds until the indicators become green and
flashing, and the device will reset to factory default settings.
Connector Description
1
2
3
Fig 1.3
1. SIM Slot
A SIM can be inserted for connecting to the network.
2. Micro USB Connector
A terminal device can be connected via USB cable.
3. Micro SD Slot
A MicroSD card (maximum 32G supported) can be inserted for file sharing/transfer or
storage.
Please do as the following to insert them (Fig 1.4).
5
7. Fig 1.4
1.2 System Requirements
CPU: Pentium 500MHz or above.
Hard Disk: 50MB available space.
Operating System: Windows XP/ VISTA 32bit/64bit/ 7, Mac OS X 10.4.9 or
higher.
Display Resolving Power: 800 × 600 pixels or above (1024 × 768 is
recommended).
Interface: Standard USB 2.0 interface.
Web Browser: Mozilla Firefox 2.0 or higher, Internet Explorer 6.0 or higher, Safari
2.0 or higher, and Opera 9.64 or higher.
One or more computing devices that support Wi-Fi (802.11b/g).
6
8. 2. Quick Start
2.1 Connect the Device
Before you want to use the device, setup your device as following:
1. Insert SIM;
2. Insert MicroSD Card if you want to use the sharing function;
3. Insert the battery;
4. Hold the Power/Connect button to power on;
5. Connect this device to your terminal device.
If you want to go to internet, manage LAN or share file, connect your terminal
device to 3G Hotspot via USB or Wi-Fi:
Via USB: If your terminal device (such as desktop) is Wi-Fi disabled, you can
connect them via USB cable. After connected in the first time, driver will be
installed automatically.
Via Wi-Fi: It is better for you to connect the device to Wi-Fi-enabled devices
through Wi-Fi, for which you don’t need to install any driver.
Fig 2.1
Note: If automatic installation failed, please check whether the antivirus and security
software is working. If it is, close it and reinstall.
2.2 Basic Tasks
Power On
7
9. Press and hold the power button more than 4 seconds. And then short press the
Wi-Fi/WPS button to turn on Wi-Fi.
The power indicator will become blue and breathing automatically if you have no
actions in 30 seconds after powering on. You can use all normal functions of the
device in this mode.
Press any button or do some operation in the web UI to exit the sleeping mode.
Sleeping Mode
If you select “Auto” in “Power-Saving mode setting” (Advanced Settings – System –
Basic Settings), when there is no data transmission (Internet, Wi-Fi, LAN containing),
it will turn Sleeping Mode automatically.
When the device is in Sleeping Mode, the 3G modem radios, the Wi-Fi radio are off,
and the power button is yellow and breathing. It works only when battery is live.
Log in to the Configuration Page
1. Open the browser, and then input the address http://192.168.1.1. The first time you
do this after driver installed, a welcome page will display from which you have 3
choices as following (Fig 2.2.1):
Fig 2.2.1
The Internet. You will go to the internet directly without any setting modification.
My 3G Hotspot's Overview page. Enter the configuration home page to view
status, customize settings or explore extra features.
Set up my 3G Hotspot. Quick setup your device.
8
10. 2. If you select the second option to the welcome page, you can overview the status of
devices (Fig 2.2.2) in the home page. After login, you can go to advanced settings
page to set the device, or go to admin setup.
Fig 2.2.2
Status Information
Category Icon Display
Signal Strength From no signal to excellent signal
Not Connected
WCDMA Unconnected WCDMA Connected
UMTS Unconnected UMTS Connected
Connection Status
HSUPA Unconnected HSUPA Connected
GPRS Unconnected GPRS Connected
EDGE Unconnected EDGE Connected
Roaming or not
Roaming Roaming Off
User
User number
9
11. SD Security SD Insecurity
MicroSD Card
SD Error SD Disabled
SD Enabled SD Card not detected
Battery Battery level from
critical to full
Data
Transmission No Transmission Transmission
Others
USB charging Charged
Table 2.2
Restart
The device will restart and go back to home page automatically after some settings
modification. And you need to re-log in.
Power Off
Press and hold the power button more than 4 seconds to power off the device.
10
12. 3. Quick Setup
To quick setup your network, make sure you have logged in; the default password is
“password”. Click“Admin Setup”to quick set your device after log in (Fig 3.1).
And you can do settings as following:
Fig 3.1
Create an administrator: This password is used to log in to the home page,
where you can view and customize your device settings. Your administrator
password must be 1–20 characters long. If you forget this password, you need to
reset the device to its default settings.
Name your Wi-Fi network (SSID): This name is visible to other Wi-Fi-enabled
devices, and is used to identify your Wi-Fi network. The length of the SSID must
be 1-32 characters long including “_”.
Set up Wi-Fi security: Select a security type and create a password for it. The
recommended setting is WPA (Fig 3.2, Fig 3.3). Anyone can access your device
and use your Internet connection if you disable this function.
WPS: Enable WPS (Wi-Fi Protected Setup) to set up Wi-Fi network and
password automatically.
11
13. Fig 3.2
Fig 3.3
If you want to see all security types (Fig 3.3), click the link (Fig 3.2) and you will find
there are totally 10 options for you to choose in the Wi-Fi security type, the options
are:
None: Not security. It is not recommended since anyone can access your device
and use your internet connection.
WEP 64 Bit - Shared: Lower security. Works with older and newer Wi-Fi devices.
Recommended only if your devices don't support WPA or WPA2. Shared WEP
uses the same key for encryption and authentication which is considered to be
less secure than open WEP. 10 HEX characters needed.
WEP 128 Bit - Shared: Lower security. Works with older and newer Wi-Fi
devices. Recommended only if your devices don't support WPA or WPA3.
Shared WEP uses the same key for encryption and authentication which is
considered to be less secure than open WEP. 26 HEX characters needed.
12
14. WEP 64 Bit - Open: Lower security. Works with older and newer Wi-Fi devices.
Recommended only if your devices don't support WPA or WPA2. Open WEP
uses the key only for encryption. 10 HEX characters needed.
WEP 128 Bit - Open: Lower security. Works with older and newer Wi-Fi devices.
Recommended only if your devices don't support WPA or WPA2. Open WEP
uses the key only for encryption. 26 HEX characters needed.
WPA - Personal TKIP: A strong security standard, supported by most Wi-Fi
devices. 8 to 63 ASCII characters needed.
WPA - Personal TKIP/AES: A strong security standard, supported by most Wi-Fi
devices. 8 to 63 ASCII characters needed.
WPA2 - Personal AES: A stronger, newer security standard. Limited to newer
Wi-Fi devices. 8 to 63 ASCII characters needed.
WPA2 - Personal TKIP/AES: A stronger, newer security standard. Limited to
newer Wi-Fi devices. 8 to 63 ASCII characters needed.
WPA/WPA2 - Personal: Wi-Fi devices that use either WPA or WPA2 can
connect to the device. Supported by most Wi-Fi devices. 8 to 63 ASCII characters
needed.
The length of your Wi-Fi password depends on the type that you've selected.
After finish the setup, click "Submit" to save and apply all the settings, close pop
dialogue and back to original interface. After reconnected to the network, click “Click
here” and start to use (Fig 3.4).
Fig 3.4
13
15. 4. Advanced Settings
Advanced settings help you to configure Wi-Fi, Internet, Router, NAT, Sharing and
System. After making some modification, you should click "Save" to save all the
settings or you can select "Cancel" to give up the modification.
4.1 Wireless LAN Settings
WLAN Settings
Make sure SIM has been inserted before you start settings. And you can turn on/off
Wi-Fi; select Wireless Interface, set SSID, Regulatory Domain, Channel, Max Number
of Users and enable/disable SSID Broadcast in WLAN Settings. (Fig 4.1.1.1).
Fig 4.1.1.1
Wi-Fi Connection: Enable Wi-Fi connection and select wireless interface (type of
wireless) to connect to your network firstly if you want to use this function.
Wireless Interface: Select "802.11g only" which can give you faster Wi-Fi
speeds when you confirm all of the Wi-Fi devices that will be connected to your
device support 802.11g, otherwise, select "802.11b/g compatible".
SSID: This name is visible to other Wi-Fi-enabled devices, and is used to identify
your Wi-Fi network. The length of the SSID must be 1-32 characters long
including “_”.
Regulatory Domain: Select the domain for the Wi-Fi access point.
Channel: Different domain has different channels (Channel 1~11 in FCC (US)/IC
(Canada); Channel 1~13 in ETSI (Europe); Channel 1~13 in MKK (Japan)). If
your network has problems (possibly caused by other Wi-Fi networks in the
vicinity using the same channel), change to another one.
Max Number of Users: Set the maximum number of Wi-Fi users. If your network
has problems, you may want to decrease the number of Wi-Fi users allowed to
connect to the device. The default and maximum value is “4”.
14
16. SSID Broadcast: Disable SSID broadcast in the access point or device to secure
Wi-Fi detected as a "cloaked" network.
Advanced settings contain Beacon Period and Data Rate.
Fig 4.1.1.2
Beacon Period: Beacon Period is the frequency of broadcast packets from the
device which is used to synchronize wireless networks. Set lower value for finding
and connecting to the device fast when higher value helps to save power.
Data Rate: There are different options when you select different Wireless
Interface. 802.11b Only: Auto, 1, 2, 5.5, and11Mbps; 802.11g Only: Auto, 6, 9, 12,
18, 24, 36, 48, and 54Mbps; 802.11b/g Compatible: All above. Default setting is
"Auto".
Note: Change this value only if you're experiencing inconsistent data flow. Make only
minor changes to this value.
Security
This part helps you configure the security of the wireless network.
Select an encryption mode in the list and set your password. If you select "None", any
Wi-Fi-enabled device can connect with the WLAN without the password.
15
17. Fig 4.1.2
None: Not security. It is not recommended since anyone can access your device
and use your internet connection.
WEP 64 Bit - Shared: Lower security. Works with older and newer Wi-Fi devices.
Recommended only if your devices don't support WPA or WPA2. Shared WEP
uses the same key for encryption and authentication which is considered to be
less secure than open WEP. 10 HEX characters needed.
WEP 128 Bit - Shared: Lower security. Works with older and newer Wi-Fi
devices. Recommended only if your devices don't support WPA or WPA3.
Shared WEP uses the same key for encryption and authentication which is
considered to be less secure than open WEP. 26 HEX characters needed.
WEP 64 Bit - Open: Lower security. Works with older and newer Wi-Fi devices.
Recommended only if your devices don't support WPA or WPA2. Open WEP
uses the key only for encryption. 10 HEX characters needed.
WEP 128 Bit - Open: Lower security. Works with older and newer Wi-Fi devices.
Recommended only if your devices don't support WPA or WPA2. Open WEP
uses the key only for encryption. 26 HEX characters needed.
WPA - Personal TKIP: A strong security standard, supported by most Wi-Fi
devices. 8 to 63 ASCII characters needed.
WPA - Personal TKIP/AES: A strong security standard, supported by most Wi-Fi
devices. 8 to 63 ASCII characters needed.
WPA2 - Personal AES: A stronger, newer security standard. Limited to newer
Wi-Fi devices. 8 to 63 ASCII characters needed.
WPA2 - Personal TKIP/AES: A stronger, newer security standard. Limited to
newer Wi-Fi devices. 8 to 63 ASCII characters needed.
WPA/WPA2 - Personal: Wi-Fi devices that use either WPA or WPA2 can
connect to the device. Supported by most Wi-Fi devices. 8 to 63 ASCII characters
needed.
The length of your Wi-Fi password depends on the type that you've selected.
16
18. MAC Filtering
MAC filtering is used to control specific MAC addresses to access.
Fig 4.1.3
No filtering: All terminal devices are allowed to access the network.
Allow all in list: Only devices in this list are allowed to access the network.
Block all in list: All terminal devices are allowed to access the network except
ones in this list.
You can select to add new configuration in the list (no more than 10), edit or delete
exist ones.
WPS
WPS (Wi-Fi Protected Setup) provide a more intuitive way of wireless configuration
between your device and the wireless client. Please make sure that the Wi-Fi-enabled
devices you want to connect support this function.
Fig 4.1.4.1
17
19. Enable WPS firstly before you want to use it.
If you select the “PIN” way, input the client’s PIN to the "Client PIN" frame (Fig
4.1.4.2).
Fig 4.1.4.2
If you select the “PBC” way, press the "WPS" button on wireless device in 120
seconds to establish WPS connection after you have pressed the "Wi-Fi/WPS" button
on your device or clicked "Save".
Fig 4.1.4.3
Click "Save" to save your settings and start connecting when you select PIN or PBC
way. You can also choose "No Connection" and click "Save" to save your settings
without connecting.
4.2 Internet Settings
Make sure SIM has been inserted before you start internet settings.
Network Settings
18
20. In the part of Network settings, you can configure the network mode and network
selection (Fig 4.2.1).
Fig 4.2.1
In “Network mode” setting, you should select the rule for registering the network. The
default selection is “Automatic”.
The default Network Selection mode is “Automatic”. When click “Manual”, a network
list will be activated, containing all searched networks. Having selected an available
network from the list, 3G Hotspot will register to the selected network.
Connection Settings
In the part of connection settings, you can configure the connect mode and profile (Fig
4.2.2.1).
This device supports “Auto”, “Manual” and “Dial Demand” way to connect to the
internet. You can modify the mode in connection settings part in Internet,
If “Auto” is selected, the automatic connection will be applied after reboot or input
the Card again.
If “Manual” is selected, you can control the connection via clicking
“Connect/Disconnect” in the home page.
If “Dial Demand" is selected, it will not connect to network until it detects the
connection from LAN or Wi-Fi. And the device will disconnect automatically when
there is no connection in a period of time (10 minutes default) after connecting.
19
21. Fig 4.2.2.1
And in the profile list, you will see the default and other APN configuration. An APN
(Access Point Name) is a reference to the Internet access point on. Different APNs for
the 2G and 3G networks may be required.
You can select other APN as default, edit or delete exist ones or create a new APN
configuration (no more than 10 in the list).
Set the profile name, APN, username and password and select Auth. Type when you
want to create a new APN profile (Fig 4.2.2.2).
Note: only input what you have received from your service provider and leave other
fields empty.
Fig 4.2.2.2
PIN Lock
You can lock the SIM with PIN to protect the device against unauthorized use and
unlock it. The default PIN and PUK are provided by the operator or service provider.
20
22. The current PIN status and the rest chances to input PIN and PUK are displayed in
this page.
The old PIN is needed if you want to unlock SIM or set a new PIN. Select “Lock” and
click “Save” button when you don’t want to use the PIN.
Note: The PUK (an 8-digit code) is required when PIN is input incorrectly 3 times. If
the PUK is wrongly input for continuously 10 times, the card will be damaged. Please
contact the network service provider for details.
Fig 4.2.3
4.3 Router Settings
LAN Settings
This part helps you set your internal network for the device which contains Router IP
Address, Subnet Mask, Hostname, DHCP Server, DHCP IP Pool, and DHCP Lease
Time.
Fig 4.3.1
21
23. Router IP Address: The router's IP address on the LAN. The default setting is
“192.168.1.1”.
Subnet Mask: The router's internal LAN subnet mask. The default setting is
“255.255.255.0”.
Hostname: User can access the device directly via entering the hostname in the
address bar of the browser.
DHCP Server: DHCP Server will automatically assign IP addresses to devices on
the network. The default setting is “Enable”.
DHCP IP Pool: Set a range of IP addresses available to access.
DHCP Lease Time: Amount of time that a Wi-Fi-enabled device can use its
assigned IP address before it is required to renew the lease.
Static DHCP
With DHCP, IP addresses are assigned dynamically; devices typically don't have a
permanent IP address. But sometimes you may want to assign a static IP address to
a device, while still using DHCP for the rest of the devices on your network.
You may want to do this with, for example, a Web server, FTP server, media server.
Fig 4.3.2
Hostname: the name of the device that you want to assign IP Address to.
MAC Address: the MAC Address of the device that you want to assign IP
Address to.
IP Address: input the permanent IP Address that you want to assign to the
device.
You can determine to enable it or not, and can also add new client and edit or delete
existing ones.
IP Filtering
IP filtering is used to control specific IP addresses to access (Fig 4.3.3).
22
24. Fig 4.3.3
Select “No Filtering" to disable this function.
Select “Block all in the list" to deny IP addresses that you have set in the IP
filtering list to access.
You can select to add new configuration in the list (no more than 10), edit or delete
exist ones.
URL Filtering
URL filtering is used to control devices on the LAN access to specific URLs.
Fig 4.3.4
Select “No Filtering" to disable this function.
Select “Block all in the list" to deny all devices in the LAN to access the URLs that
you have set in the URL filtering list.
You can select to add new configuration in the list (no more than 10), edit or delete
exist ones.
23
25. Device List
The Device List lists the information about the device in the LAN including IP address,
host name, MAC address and connect mode.
Fig 4.3.5
4.4 NAT Settings
Application Settings
This part helps you configure UPnP (Fig 4.4)
Fig 4.4
UPnP: UPnP (Universal Plug and Play) provides connectivity among consumer
electronics, intelligent appliances and mobile devices from many different
vendors.
Note: When not required, it should be disabled since they may cause security risk.
4.5 Sharing
24
26. This product uses Samba as the base to implement file sharing. Make sure your
MicroSD card (maximum 32G supported) has been inserted correctly in the MicroSD
slot on the device before you use the sharing function.
Fig 4.5
You will see the information about storage, available space and file system of the
MicroSD card. After enabling the samba settings, give a sharing name to your
MicroSD card, which will be shown in the file browser program. The default setting of
is “shared”.
When select “none” in user settings, anyone can access the MicroSD card without
username and password; or you can choose “Usermode” and set the username and
password, default setting of both is “guest”.
After settings finished, you can use the sharing function as following:
In Windows OS, open your browser and input http:192.168.1.1shared (Sharing
name) to access your MicroSD Card. Input user name and password in the
Pop-up box.
In MAC OS, Select “go - Connect to server” in “Finder”, and then input:
smb://192.168.1.1. Input user name and password in the Pop-up box.
In Linux OS, open “run menu” (Alt+F2) and input: smb://192.168.1.1/shared
(Sharing name). Input user name and password in the Pop-up box.
4.6 System Settings
Basic Settings
This part helps you configure System Language, Power-saving Mode, Change
Password and Firmware Upgrade (Fig 4.6.1).
25
27. Fig 4.6.1
Change Password: Input the new password; confirm it and click “Save” to finish
the settings.
Language Select: Select the language that you want to see during using the
configuration.
Power-Saving Mode (Sleeping Mode): When the device is in Sleeping Mode,
the 3G modem radios, the Wi-Fi radio are off, and the power button is yellow and
breathing. If you select “Auto”, when there is no data transmission (Internet, Wi-Fi,
LAN containing) in a time, it will turn into Sleeping Mode automatically. Selection
“Off” to disable this function.
Firmware Update: Select the firmware file in your PC first and click “Update”. It
will update automatically. Please wait while the upgrade occurs; this may take
several minutes.
Note: During installation of the update, do not turn off or unplug the device. And Your
Wi-Fi and Internet connections won’t be available.
System Log
In this page contains system log information (Fig 4.6.2).
26
28. Fig 4.6.2
Click "Download" to download the log information to the local PC.
Click "Refresh" to update the log information.
Click "Clear" to delete all the log information.
Configuration
This part helps you Reset to factory default settings, Backup Settings or Restore
Settings (Fig 4.6.3).
Fig 4.6.3
Click "Reset" to reset the configuration to the factory settings.
Click "Backup" to back up the configuration file to the local PC.
Click "Restore" to restore the settings from the configuration file backed up in the
local PC.
27
29. 5 Warning and Precautions
Electronic Device
Turn off your device near high-precision electronic devices. The wireless device may
affect the performance of these devices. Such devices include hearing aids,
pacemakers, fire alarm system, automatic gates, and other automatic devices can be
affected. If you are using an electronic medical device, consult the device
manufacturer to confirm whether the radio wave affects the operation of this device.
Hospital
Pay attention to the following points in hospitals or health care facilities:
Do not take your wireless device into the operating room, intensive care unit, or
coronary care unit.
Do not use your wireless device at places for medical treatment where wireless
device use is prohibited.
Storage Environment
Do not place magnetic storage media such as magnetic cards and floppy disks
near the wireless device. Radiation from the wireless device may erase the
information stored on them.
Do not put your wireless device and other accessories in containers with strong
magnetic field, such as an induction cooker and a microwave oven. Otherwise,
circuit failure, fire, or explosion may occur.
Do not leave your wireless device in a very hot or cold place. Otherwise,
malfunction of the products, fire, or explosion may occur.
Do not subject your wireless device to serious collision or shock. Otherwise,
wireless device malfunction, overheat, fire, or explosion may occur.
Children Safety
Put your wireless device in places beyond the reach of children. Do not allow
children to use the wireless device without guidance.
Do not allow children to put the device in mouth.
Do not allow children to touch the small fittings. Otherwise, suffocation or gullet
jam can be caused if children swallow the small fittings.
Operating Environment
The wireless device is not water-resistant. Keep it dry. Protect the wireless device
from water or vapor. Do not touch the wireless device with a wet hand. Otherwise,
short-circuit and malfunction of the product or electric shock may occur.
Do not use the wireless device in dusty, damp and dirty places or places with
magnetic field. Otherwise, malfunction of the circuit may occur.
On a thunder stormy day, do not use your wireless device outdoors.
28
30. The wireless device may interfere with nearby TV sets, radio and PCs.
In accordance with international standards for radio frequency and radiation, use
wireless device accessories approved by the manufacturer only.
Cleaning and Maintenance
Before you clean or maintain the wireless device, turn off it and disconnect it from
the power. Otherwise, electric shock or short-circuit may occur.
Do not use any chemical detergent, powder, or other chemical agent (such as
alcohol and benzene) to clean the device. Otherwise, part damage or a fire can
be caused. You can clean the device with a piece of soft antistatic cloth that is a
little wet.
Do not scratch the shell of the wireless device. Otherwise, the shed coating may
cause skin allergy. Once it happens, stop using the device at once and go to see
a doctor.
If the wireless device or any of its fittings does not work, turn to the local authorize
service center for help.
29