At the outset, we need to highlight that telecoms law is a complex area of law and that we are by no means experts in the field. This article will only highlight some of the key elements with regards to the regulations and process for consideration when starting up a WISP (Wireless Internet Service Provider) in South Africa.
Do you understand how Yeastar Multisite Interconnect differs from the traditional ways of inter-branch connection via SIP trunking?
This post summarises the facts around the www service vulnerability in RouterOS which was published by Wikileaks as part of the Vault 7 document release. The vulnerability affected the RouterOS webfig configuration interface if no firewall was put in place to protect it. MikroTik fixed the vulnerability in the following RouterOS releases.