In this second post, I will cover some of the more detailed configurations within OBS Studio, including how I set up the Camera feed from the Ubiquiti camera, the weather overlay, and some tips for reliability using Advanced Scene Switcher. Check out the stream HERE! Computer & Operating System OBS Studio can run on Windows,…
Author: abnadmin
Setting up a Weather Camera to Live Stream on YouTube
Welcome! This is the first post in a series on how I set up a Ubiquity Security Camera to Live Stream to YouTube, showing an overlay of local weather information. These posts will cover some of the setup with the Camera, NVR, Weather Station, and Home Assistant setup. The next post will cover the computer…
1 Year Metronet Review
It’s been about a year since we installed MetroNet at home, and I wanted to provide a review of their Internet service in Portage. Overall, it has been fairly reliable with no major issues. However, with some price concessions from Spectrum and AT&T fiber now available, it might not be the best option. Reliability I…
AMSAT GridMaster Award
After just under 7 years, I have worked and confirmed all 488 US Grids to complete the AMSAT GridMaster award! Many thanks to the Super and Sneaky rovers who traveled to these remote areas for activations! I have worked all of these grids portable, most from my front or back yard. All contacts were made…
MetroNet Install
Over the past few months, I’ve been observing MetroNet as they prepare our neighborhood for Fiber Internet. Now that I’ve had it for a little while, I’d like to discuss the technical process and my experience! The preparation for the project was extensive and lasted for several months. Firstly, the underground utility markers were sent…
Man-in-the-middle (MITM) attack
A man-in-the-middle (MITM) attack is a cybersecurity attack where an attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. In this attack, the attacker positions themselves between the sender and the recipient, essentially “eavesdropping” on the communication flow. Here’s how a typical man-in-the-middle attack…
Setting up Your Ubiquiti Wireless Network with UniFi w/NSA Best Practices
This week, our focus will be on setting up a complete Ubiquiti Wireless Network using the UniFi controller software, from beginning to end. You have the option of running the UniFi OS on dedicated controllers, routers, Raspberry Pi, or Windows computers. Once the network is initially configured, the UniFi controller may not be necessary and…
Post 6: Access Point Comparison
Today, I will be comparing the features of different access points. It is advisable to purchase access points from the same manufacturer to ensure compatibility and easy setup. To manage multiple wireless access points, it is recommended to use a wireless controller for a managed wireless network. Before buying any access points, ensure you check…
Post 5: Wi-Fi Access Points
This week I will be talking about implementing a wireless network. Several weeks ago we talked about all-in-one devices that have WI-Fi built into the router. Today we will be talking about implementing a wireless network where the Access Points are separate from the router and spread through your office. After analyzing our small and…