Internode Blog

What is Mesh WiFi – and do you need it?

Thursday, March 10th, 2022 by
Mesh WiFi

What would we do without WiFi – that awesome, handy way to connect devices to the internet without any pesky wires?

In your home, you might find that your WiFi is stronger in some rooms than others. Perhaps you even have some ‘dead spots’ in your house. While it can be frustrating, the good news is that there’s a way to strengthen your connection throughout your whole home: Mesh WiFi!

You may have already seen the term floating around online or even at your local electronics store. So, what’s the difference between standard WiFi and Mesh WiFi, and who needs it? Let’s find out!

(more…)

The evolution of the mobile phone

Wednesday, October 20th, 2021 by

Can you believe it’s been nearly fifty years since the invention of the mobile phone? It’s true! A prototype mobile handset developed by Motorola was used to make the world’s first mobile phone call in 1973 – they called one of their competitors to let them know the good news.

However, while mobile phones existed way back in the 70s, it would be a long time before the average person owned one! In Australia, the earliest mobile network wasn’t built until 1981 with just three 500MHz base stations operating out of Melbourne, and 2G mobile networks didn’t roll out in capital cities until 1993. It’s fair to say that mobiles have gotten pretty popular in the decades that followed, with 75.8% of Aussies owning a smartphone as of 2017.

Let’s take a walk down mobile memory lane and find out how our handsets got to be the way they are today.

(more…)

How to spot scams

Tuesday, September 21st, 2021 by

So far this year, over $190 million has been lost to scams and hoaxes. The most common method of attack is a practice called Phishing.

Not to be confused with the leisurely pastime of catching fish, “phishing” works by luring people to give out their important personal information, such as account passwords or payment details, to use in fraud and theft.

The typically done by pretending to be a trusted, well-known company in an attempt to trick you into supplying personal information, visiting fraudulent websites or installing malicious software on your devices.

We’ve put together some handy advice to help you stay protected.

(more…)
Older Posts »