What Netgear router can I buy to use with BT Infin...

I'm finding that the BT Hub 3 is totally unusable - it drops the wireless connection every 5 secons or so, I have tried changing to various channels 2,6,11 still the same problem
I've always had Netgear routers in the past and have never had any issues with them, can someone please recommend a good Netgear router that will work with BT Infinity
Thanks in advance

jags wrote:
I just bought a Netgear WNR2200, and it works fine with the Infinity Modem. £45 from Maplins. It does what the HH3 should do, but doesn't...........KEYWORD BLOCKING......are you listening BT?
Is that a new security feature because thats not all it lacks.
toekneem
http://www.no2nuisancecalls.net
(EASBF)

Similar Messages

  • What wireless router would be good to use with OS 10 Lion at home?

    I have a Mac Book Pro with Leapard and I just recently purchaced a iMac with Lion. I want to set up a wireless network with my provider, in my house. What wireless router should I use that is compatable with Lion OS?

    Virtually any modern wireless router that has its latest Firmware updates should work fine.  I myself have been extremely pleased with my Apple Airport Extreme wireless router, but spending that much money is not necessary.
    Hope this helps

  • What router can I buy to be compatible with my ATT Uverse service?

    What router can I buy to be compatible with my ATT Uverse service?I would like a fairly fast moderately priced one. My current router does not work and I prefer to own the router than rent from them.

    You may purchase any router you desire, preferably a dual band, and place behind the Uverse RG in either DMZ mode for pace/2 wire products or IP Pass through for Arris/Motorola products. However you must have a Uverse RG for actual connection due to certificate authorized service.Resulting in the need for the company owned/maintained equipment fee, currently $7 per month, for new installations and repairs of existing accounts requiring the RG replacement.

  • I have the airport express as router can I buy the new airport express and use my old airport to extend my net?

    I have the airport express as router can I buy the new airport express and extend my net?

    Things can get confusing pretty quickly since there are 3 different versions of the AirPort Express.
    If by "old", you mean you have Model No A1084 or A1088 AirPort Express (look at the label on the side of the device for the Model No), it cannot be used with the "Extend a wireless network" feature of other newer Apple routers.
    If your AirPort Extreme is "square" shaped with rounded corners, then the "old" AirPort Express will not work with your AirPort Extreme using the "Extend a wireless network" settings.
    You could use a "previous version" AirPort Express, Model No A1264 to "Extend", or the "new" AirPort Express, Model No A1392, for that purpose.
    If your AirPort Extreme is a simultaneous dual band product, then the "new" Express would be able to "extend" both bands.  The "previous" AirPort Express (Model A1264) would be able to extend only one band, since it is not a dual band device.

  • Hi I have an iTunes account with my uk debit card but am currently in Australia, can I buy and use an iTunes/app store gift card in AU$ or am I only allowed to acces the store in gbp£ ?

    Hi I have an iTunes account with my uk debit card but am currently in Australia, can I buy and use an iTunes/app store gift card in AU$ or am I only allowed to acces the store in gbp£ ? Cheers

    I had the same error when trying to update my apps on my ipod touch. I tried to input my security code numerous times to no avail. I also made sure my billing address was the same as what my bank had on file. To fix the issue I went into iTunes, logged onto the iTunes store, went to account settings and reviewed my recent purchases. Turned out that I had made a recent purchase and didn't have enough money left on my credit card to pay for it at the time. I paid off the credit card, and then input my security code once more and now it works fine. I've heard that some debit or pay as you go credit cards require a minimum balance, so make sure you have at least that amount in your account.

  • What ADSL modem do you advise to use with my new airport extreme? I have tried a basic TP-Link ADSL2  modem and I can't get the configuration working. What modem does Apple recommend?

    I am having problems setting up airport extreme.
    What ADSL modem do you advise to use with my new airport extreme? I have tried a basic TP-Link ADSL2+  modem and I can't get the configuration working. What modem does Apple recommend?

    Ok well I have looked around some more and have found this to be the most up to date official response to my question as seen at this link here:
    http://www.actiontec.com/support/product_details.php?pid=41#q27
    Can I Bridge the Actiontec MI424WR router that Verizon provided, when I signed up for FiOS service?
    The MI424WR does not have a bridging option, and neither Verizon nor Actiontec support attempting to bridge it.
    The desire to bridge the MI424WR is based on a misunderstanding that it is a modem as well as a router. Actiontec does produce DSL Gateways that have a Transparent-Bridging option, which bypasses or disables the router function and allows the Gateway to act simply as a DSL modem, when it is enabled. Many consumers do not realize that with FiOS, the ONT (typically outside the home) is the device that handles changing the FiOS signal from Fiber to either Ethernet or Coax, and that the Router is just a Router, and if it was bridged or bypassed, it would be a device without a function. For most Verizon FiOS customers their service would completely stop if the MI424WR was bridged, because the Video on Demand service is dependent on it to work.
    If your ONT is connected to the Actiontec MI424WR router via Coax, the MI424WR is required due to the Coax connection. But if the ONT is connected to the MI424WR via Ethernet, then in most cases some other router can be substituted for the MI424WR, and it can be removed."
    So it looks like I will be calling Verizon support to see about getting the Ethernet connection installed and getting another modem...

  • Can I buy a "used then uninstalled" version of Leopard?

    If a person is advertising a copy of Leopard as "used then uninstalled" (a fellow student my university who got it as a gift, installed it, then needed cash, and is trying to offload it) can I buy it and install on my Macbook? I do trust the person to have done what they say, but in the event they've lied (people are people), if I have all the documentation, etc I would then be the legal owner, right? (I seem to recall a Supreme Court decision that said manufacturers could not prohibit the resale of software as long as it was taken off the first machine.)
    Anyway, just curious. I can save $15 this way and help out a fellow student. If I can't, no biggie, since I can afford retail.

    *" Can I buy a "used then uninstalled" version of Leopard? "*
    Yes

  • Good night, do not know what is happening can not buy gold with my visa card for itunes gives me error, but I have money on the card, always worked but this time not accepted!!

    good night, do not know what is happening can not buy gold with my visa card for itunes gives me error, but I have money on the card, always worked but this time not accepted!!

    To Contact iTunes Customer Service and request assistance
    Use this Link  >  Apple  Support  iTunes Store  Contact

  • HT4106 I have a camera connection kit for my ipad 2. Can this kit be used with my new ipad air?... If so what adapter is required please

    Camera connection kit for ipad 2. Can this kit be used with ipad air and if so what adapter(s) are required please

    You can try the 30 pin to lightning adapter but I'm not sure if that'll work. So if you get it to experiment, make sure you can return it. Apple does sell a SD to lightning adapter for the newer devices. So that should be a sure bet. The main downside is that your 30 pin camera kit came with both USB and SD for 29 and now the USB adapter is 19 and the SD adapter 29, so more expensive.
    You may want to look into third party adapters, but make sure you use a reputable manufacturer (ie not a cheap no-name off amazon) because iOS7 brought with it software that looks for a signed chip in the adapter. And a chip is 'signed' when a company gets apple's permission to make accessories. I would suggest sticking with companies like Belkin, Kensington and Targus. They seem to be of a better reputation when making things and would have a signed chip.

  • Can I buy and use two upgrades?

    Hello,
    have Creative Suite 5.5 Production Premium. I want to upgrade the product.
    Can I buy and use two upgrades: Creative Suite 6 Design Standard
    and Creative Suite 6 Production Premium?
    Second question: if I make my upgrade Creative Suite 5.5 Production Premium (which has included, among othersAdobe Premiere Pro) to Creative Suite 6 Design Standard (which does not have Adobe Premiere Pro), will I still be able to use the applications contained in the Creative Suite 5.5 Production Premium (Adobe Premiere Pro), or it will be deactivated?
    Thank you

    What would you want with 2 upgrades if you have only 1 qualifying product? That's simply not possible since the upgrade serial is tied to the serial number of the previous product. Otherwise your CS5.5 will remain fully functional when you install CS6.
    Mylenium

  • Can I buy IMAC using my GEmoney Cards?

    Can I buy IMAC using my GEmoney Cards?

    Apple's accepted payment methods >  http://store.apple.com/us/help/payments

  • What version of Flash Player should I use with my Power PC based Mac?

    I did the following (see below from a Recent Forum) - and even got a sucessful INSTALLED, but when I go to YouTube....I can not get anything and I am asked to update FLASH.....thoughts?
    What version of Flash Player should I use with my Power PC based Mac?
    Please follow these instructions for installing the most recent version of Flash Player that supports PowerPC based Macs
    1. Follow the instructions for uninstalling Flash Player on the Mac: Uninstall Flash Player
    2. Download and extract the Flash Player 10.1.102.64 zip file
    3. Navigate into the folder "/Flash Player 10.1.102.64/10_1r102_64/"
    4. Mount the file "flashplayer10_1r102_64_ub_mac.dmg" by double clicking
    5. Install using the normal procedure

    I was finally able to successfully installed FP on my Mac OS 10.5.8 using the last trick shown below by Chris (Adobe Flash Player.pkg file). This, only after several (at least 10) attempts, and only after restarting my computer after downloading the install file. Thanks for the helpful post.

  • Can Keynote 5 be used with Yosemite?

    Can Keynote 5 be used with Yosemite?
    I have quite a few very sophisticated Keynote 5 presentations and I would hate to have to go through and re-do them if forced to work in Keynote 6.
    Anyone tried to use Keynote 5 in Yosemite?

    No problems yet, but I just ordered a new iMac Retina with Yosemite pre-installed (I assume) for my wife, who uses Keynote and absolutely hated KN6 that  auto-displaced her KN5 when i inadvertently updated her system to Mavericks. 
    Fortunately, I was able to re-install KN5 and it runs fine in Mavericks, so far.  Looks like I will be doing the same with Yosemite, if you are correct.  For an experienced KN5 user, KN6 should not have had a steep learning curve. But it did.  And to top things off, KN5 presentations my wife built in the past averaged 500mb file sizes compared with a KN6 presentation she built with a similar number of slides and photo content that sized out at 17GB!!!  That was really nice.  You have to wonder if anyone at Apple knows what they are doing? 
    Thank you for your response;  However, if you are wrong, the iMac Retina is going straight back to them.  I know of no other company that is more clueless about serving their customer's needs than Apple.

  • Can a nook be used with os7

    Can a Nook be used with Apple products?  I don't want network or virus problems.

    Android is the most malware-prone, insecure platform there is - but millions of users seem to survive without dropping like flies!
    I can't answer Q.1 but as for Q2:
    How safe is your smartphone? (Android is the top malware collector)
    A major source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace:
    More than 50 applications available via the official Android Marketplace were initially found to contain a virus.
    Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.
    Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.
    Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.
    http://www.bbc.co.uk/news/technology-13422308
    The data being leaked is typically used to get at web-based services such as Google Calendar.
    The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.
    http://www.bbc.co.uk/news/technology-12633923
    Smartphones and social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.
    Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code
    Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.
    In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area, and Android is still in the firing line:
    http://www.bbc.co.uk/news/uk-15600697
    Android: it's getting worse: Juniper found a 400% increase in Android malware from 2009 to the summer of 2010.  We have since seen exponential grow in Android malware over the last several months. The Juniper Global Threat Center found that the months of October and November are shaping up to see the fastest growth in Android malware discovery in the history of the platform. The number of malware samples identified in September increased by 28% over the number of the known Android malware samples. October showed a 110% increase in malware sample collection over the previous month and a striking 171% increase from what had been collected up to July 2011.
    July 2012: Smartphones running Google's Android software have been hijacked by an illegal botnet, according to a Microsoft researcher.
    Botnets are large illegal networks of infected machines - usually desktop or laptop computers - typically used to send out masses of spam email.
    Researcher Terry Zink said there was evidence of spam being sent from Yahoo mail servers by Android devices:  http://www.bbc.co.uk/news/technology-18720565
    One question Juniper always get when discussing our research is if Apple’s iOS is more or less secure than Android? Maybe, but it’s not necessarily because of the security or lack of vulnerabilities in the platforms themselves. The main reason for the malware epidemic on Android is because of different approaches that Apple and Google take to police their application stores. Android’s open applications store model, which the lacks code signing and an application review process that Apple requires, makes it easy for attackers to distribute their malware. There is still no upfront review process in the official Android Market that offers even the hint of a challenge to malware writers that their investment in coding malware will be for naught.
    http://globalthreatcenter.com/?p=2492
    At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.
    Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.
    The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.
    (Apple closed out 2011 with a commanding 52.1 percent share of mobile devices tracked browsing the Web, while Google's Android had just 16.2 percent.)
    And most recently this:
    Millions of people are using Android apps that can be tricked into revealing personal data, research indicates.
    Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins.
    These apps failed to implement standard scrambling systems, allowing "man-in-the-middle" attacks to reveal data that passes back and forth when devices communicate with websites.
    http://www.bbc.co.uk/news/technology-20025973
    And this:
    Freezing an Android phone can help reveal its confidential contents, German security researchers have found.
    The team froze phones for an hour as a way to get around the encryption system that protects the data on a phone by scrambling it.
    Google introduced the data scrambling system with the latest version of Android called Ice Cream Sandwich.
    The attack allowed the researchers to get at contact lists, browsing histories and photos.
    http://www.bbc.co.uk/news/technology-21697704
    Update from May 2013:
    Malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the only platform being actively targeted is Google's Android, which researchers now say is resembling Windows on the desktop PC.
    http://appleinsider.com/articles/13/05/14/mobile-malware-exploding-but-only-for- android
    And in early June 2013 a highly toxic trojan began attacking the Android platform:
    According to reports:
    Obad.a exploits previously unknown Android bugs, uses Bluetooth and Wi-Fi connections to spread to near-by handsets, and allows attackers to issue malicious commands using standard SMS text messages.
    By exploiting this vulnerability, malicious applications can enjoy extended Device Administrator privileges without appearing on the list of applications which have such privileges," Unuchek said. "As a result of this, it is impossible to delete the malicious program from the smartphone after it gains extended privileges."
    More information here:
    http://arstechnica.com/security/2013/06/behold-the-worlds-most-sophisticated-and roid-trojan
    A recent study on smartphone malware has found that 92 percent of nefarious mobile software is targeted at Google's Android platform, and the amount of attacks are growing:
    The latest data released in June 2013 by Juniper Networks reveals that Android malware has grown at a "staggering rate" over the last three years. In 2010, it accounted for just 24 percent of all mobile malware, while as of this March the platform accounts for nearly all of it.
    In the last year alone, the total number of malicious apps has grown 614 percent to 276,259. The annual Mobile Threats support also identified more than 500 third-party Android application stores worldwide that are known to host mobile malware.
    http://newsroom.juniper.net/press-releases/juniper-networks-finds-mobile-threats -continue-ram-nyse-jnpr-1029552
    The far reaching vulnerability, discovered by San Francisco's Bluebox Security, involves "discrepancies in how Android applications are cryptographically verified & installed, allowing for APK code modification without breaking the cryptographic signature."
    Android apps (packaged as an "APK") are signed with an encryption key (just like iOS apps) to prevent a malicious party from changing the code. Signed apps are expressly designed to enable the system to detect any tampering or modification.
    However, due to the newly discovered Android flaw, a rogue developer can trick the system into thinking that a compromised app is still legitimate, giving it system wide access to do virtually anything.
    "A device affected by this exploit could do anything in the realm of computer malice, including become a part of a botnet, eavesdrop with the microphone, export your data to a third party, encrypt your data and hold it hostage, use your device as a stepping stone to another network, attack your connected PC, send premium SMS messages, perform a DDoS attack against a target, or wipe your device," a representative of the company wrote AppleInsider:
    http://appleinsider.com/articles/13/07/03/security-flaw-opens-all-modern-android -devices-to-zombie-botnet-takeover
    The problem (with Android) is: that committee design has failed to make Android a good platform for either users or for developers. By not making any hard choices and giving people what they said they wanted, Google simply abandoned the future to cling tenaciously to the past.
    Rather than conceptualizing and engineering really new solutions to historical computing problems as Apple did with iOS, Google has only attempted to wrest control away from iOS via volume shipments and has effectively sent mobile computing back in time into the 1990s, resulting in the same malware, spyware, viruses and usability issues of Windows.
    http://appleinsider.com/articles/13/07/14/editorial-googles-android-haunted-by-s teve-jobs-warnings-on-app-signing-security
    The Department of Homeland Security considers the malware threat from Android so serious that they issued a public warning on July 23, 2013:
    http://info.publicintelligence.net/DHS-FBI-AndroidThreats.pdf

  • Can different music be used with different set of photos in a slide show?

    Can different music be used with different set of photos in a slide show?

    Yes. The basic idea is that you make a playlist of songs and choose that to use with the slideshow, rather than any particular song. In iPhoto 11 you can do this in iPhoto. In earlier versions you do this in iTunes.
    There is a limitation. Each song will play the full way through, you can't croassfade from one to another and so on.
    Alternatives to iPhoto's slideshow include:
    iMovie, on every Mac sold.
    Others, in order of price: PhotoPresenter  $29
    PhotoToMovie  $49.95
    PulpMotion  $129
    FotoMagico $29 (Home version) ($149 Pro version, which includes PhotoPresenter)
    Final Cut Express  $199
    It's difficult to compare these apps. They have differences in capability - some are driven off templates. some aren't. Some have a wider variety of transitions. Others will have excellent audio controls. It's worth checking them out to see what meets your needs. However, there is no doubt that Final Cut Express is the most capable app of them all. You get what you pay for.

Maybe you are looking for