Skip to main content

标 题: 高端路由器都是忽悠,根本不值得花那么多钱买

标  题: 高端路由器都是忽悠,根本不值得花那么多钱买
发信站: BBS 未名空间站 (Tue Oct 14 11:56:54 2014, 美东)


手头上有n66,ac68,刷过各种firmware,还是那个屌样。
插上usb盘做nas,即使是usb3.0接口,可是写速度根本不够,bt如果以3兆速度写入,
路由器很快的变慢,然后挂了,再也没法上网了,只能拔电源重启路由器。后来上qnap
做nas,再也没有死机了。
还有在路由器上启动ssh server,用它做ssh sock proxy,虽然可以用,可是及其不爽
,每过10几秒钟,就突然变得慢,ping就timeout,或者干脆没有响应。没办法,只好
上一个j1900小server做proxy,ssh一点问题都没有。
所谓的300m或者更高的ac速度也是个笑话,需要很靠近路由器的时候,才有可能达到,
过一堵墙,马上什么速度都没有了,再过一个窗户,维持基本连接都成问题。
结论就是高端路由器根本没有用,不要听某些id忽悠,捡什么路由器deal,那些路由器
贵而且性能低下,内存和cpu都跟小服务器没法比的。应该买个便宜的路由器外加小
server,那个j1900有deal时候,也就160刀,跟高端路由器价格不会差多少,可是稳定
而且强大多了。http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...