MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

MikroTik Training Centre, Toronto, Canada MikroTik Value Added Distributor

T (647) 477-0163
Email: support@wirelessnetware.ca

Wireless Netware Technology LTD.
550 Alden Road, Unti# 210A, Markham, Ontario L3R6A8

Open in Google Maps
  • Home
  • Solutions
  • Services
  • Become a Canadian ISP
    • Business Internet
  • Partners
  • Hardware
  • Training
  • Blog
  • About
  • Contacts
MikroTikSupport
  • Home
  • Blog
  • Blog
  • Netwire Inc., Wireless Netware Ltd., are now one!
Sunday, 24 February 2019 / Published in Blog

Netwire Inc., Wireless Netware Ltd., are now one!

Enjoy our Value-Added MikroTik Distribution we offer you which has never been provided by anyone else before. Because we know how important your business is, and what supports your business need to receive as quickly as possible with a reasonable cost.

In this announcement:

  • Merge Netwire Inc. and Wireless Netware Technology LTD.
  • Take advantage of our free services
  • Reseller accounts.
  • Partnership.
  • Upcoming MikroTik Training Courses. “10% Discount Coupon.”
  • OEM “Branding Maker”

=====================

Merge Netwire Inc. and Wireless Netware Technology LTD.


For our valuable customers, and to offer better services related to MikroTik including Hardware distribution, Training, Consultant, and support, we have decided to merge Netwire Inc. and Wireless Netware LTD.

Regarding these changes, Netwire.ca would not provide any salse for MikroTik Hardware in the future.

Almost all of the Netwire accounts transferred to the new website so you can use the below URL to either create a new account or reset your password.

Wireless Netware LTD, will be represented as Value-Added-Distributor and you could place your orders using the below URL:

MikroTik Canada Value-Added-Master-Distributor

Password recovery

Create a new account

For the RMA and Support

=====================
Hardware/Configuration Consultant!


MikroTik Value Added Distributor!


To find solutions, generate quotes, and place orders with the help of MikroTik Certified Engineer. 


If you have bought a RouterOS license or a RouterBOARD product, limited support service might be provided by e-mail for 30 days after the purchase by support@wirelessnetware.ca. 


If you are not knowledgeable on how to configure MikroTik RouterOS, we offer an hour free configuration credit by phone or remote access valid 10-day from the date of the invoice.

It’s all free.

Our mission as the only MikroTik Coordinator in Canada is to support you and businesses like yours to build a stable network of relationships with customers. To this aim, we at Wireless Netware Ltd. have devised a partnership program that offers member companies a myriad of bonuses and opportunities to make notable progress.

Some of the services offered in this partnership program include
1) Free training course once a year,
2) Free workshop every three months,
3) 50% discount on extra training courses and seminars,
4) Discounts on expert consultations,
5) Priority support, as well as other need-based services.

In our partnership program, we also provide trial hardware, up to 20% discount on every hardware purchase order, critical hardware recovery, one-business-day shipping anywhere in Canada, as well as ample priority pickup timeframes at the store.
For more information, please visit our website:
https://tvoip.ca/partners/.

If you had a reseller discount with us and you want to activate it under the new account or upgrade it to PARTNERSHIP account, an get advantage of our partnership program, sent us an email to partners@wirelessnetware.ca, and we will help you to set up your account.

As a MikroTik Training Center, we are offering public and group training courses.

Please review the schedule of upcoming MikroTik training sessions below. Contact us via training@wirelessnetware.ca to sign up!
Complete schedule –

Enjoy 10% discount coupon “MikroTikTraining” available until March 15th, 2019

Available for our Partners and Resellers only:

Branding Package Maker
The generated package can be installed on any RouterOS version. You can upload just the router web page logo, The Hotspot login page logo. For RouterOS default configuration.
We can offer to change:
-SNMP name.
-Router Default Configuration
-HTTP Skin
-Telnet/SSH logo
-Redirect support page to your website
Find out more more here:

MikroTik Routers and Wireless Distributors

Tagged under: MikroTik Canada, Netwire Inc.

What you can read next

The First MikroTik product with 10G RJ45 Ethernet ports, CRS312-4C+8XG-RM
LHG LTE kit
MikroTik Newsletter #2018-8, July 10, 2018

Recent Posts

  • Load-balance using PCC in MikroTik RouterOS v 6.xx

    Introduction PCC “Per Connection Classifi...
  • Audience – a router for those who value both beauty and functionality

    Audience is a tri-band (2.4 GHz & high + lo...
  • DO NOT let the cables limit you, More Throughput over Power!

    PWR-LINE PRO PWR-LINE PRO (PL7510Gi) is a smart...
  • The First MikroTik product with 10G RJ45 Ethernet ports, CRS312-4C+8XG-RM

    CRS312-4C+8XG-RM Switch of the future: the firs...
  • Netflix has identified vulnerabilities in RouterOS.

    Netflix has identified several TCP networking v...

RSS MikroTik Blog

  • CVE-2024-54772
    Issue Summary A vulnerability has been identified in the WinBox service, where a discrepancy in response size between connection attempts with valid and invalid usernames allows attackers to confirm if user accounts exists via brute forcing the login process. In other words, when attacker tries to log into the device, by examining the response, the […]
  • CVE-2023-30799
    A new CVE has been published, which describes a policy elevation issue, where a logged in administrator with “policy” permissions (able to grant additional permissions to any user on the router), is also able to send crafted configuration commands, that are exchanged internally by the router software components and normally are rejected when sent by […]
  • CVE-2023-32154
    On 10/05/2023 (May 10th, 2023) MikroTik received information about a new vulnerability, which is assigned the ID CVE-2023-32154. The report stated, that vendor (MikroTik) was contacted in December, but we did not find record of such communication. The original report also says, that vendor was informed in person in an event in Toronto, where MikroTik […]
  • Mēris botnet
    In early September 2021 QRATOR labs published an article about a new wave of DDoS attacks, which are originating from a botnet involving MikroTik devices. As far as we have seen, these attacks use the same routers that were compromised in 2018, when MikroTik RouterOS had a vulnerability, that was quickly patched. There is no […]
  • Fragattacks
    In beginning of May 2021, a security research group from Belgium published a set of vulnerabilities they call “Frag Attacks” (from Fragmentation Attack), which affect all modern security protocols of Wi-Fi. Not all the published issues affect MikroTik products, but those that were found to be potentially affecting RouterOS, have been fixed in all currently released […]
  • Upgraded package signatures
    The RouterOS package signing procedure has been upgraded, to use new algorithms and utilize state of the art security hardware. It will also add a possibility to verify the integrity of existing installations. The new updated package signing procedure provides additional security to prevent installation of malicious software. Best security practices: Keep RouterOS updated to the […]
  • CVE-2019-3981
    Summary Tenable has published a potential vulnerability in older RouterOS versions where an attacker can retrieve the password hash of a RouterOS username via a complex man-in-the-middle attack over port 8291. The attacker must be able to intercept a valid RouterOS user login attempt, so he must be located in the same network as the […]
  • DNS cache poisoning vulnerability
    Tenable has identified a vulnerability in RouterOS DNS implementation. RouterOS 6.45.6 and below is vulnerable to unauthenticated remote DNS cache poisoning via Winbox. The router is impacted even when DNS is not enabled. One possible attack vector is via Winbox on port 8291 if this port is open to untrusted networks. The resolver can be […]
  • Package validation and upgrade vulnerability
    Tenable has identified a couple of issues with RouterOS packaging and upgrade systems. The upgrade system used by RouterOS 6.45.5 and below is vulnerable to man in the middle attacks and insufficient package validation. An attacker can abuse these vulnerabilities to downgrade a router’s installed RouterOS version, possibly lock the user out of the system, […]
  • CVE-2019-11477, CVE-2019-11478, CVE-2019-11479
    Summary Netflix has identified several TCP networking vulnerabilities in the Linux kernel that is used in RouterOS. The vulnerabilities can trigger denial of service if the RouterOS system is attacked from an insufficiently protected network interface (port). Firewall can protect against the issue. MikroTik has already applied the necessary patches: fix included in RouterOS 6.45.1 and […]

General information

MikroTik Training Schedules
My Certificate Validation
Who is my local MikroTik Consultant
How to become a MikroTik Consultant
How to become a MikroTik Certified Trainer

Useful URLs

MikroTik Distributor
MikroTik WiKi "Documentation"
MikroTik useful Articles and Examples
The Dude "Monitoring, Notification, Syslog"
User Manager "Free Radius Server"

Legal

  • Privacy Policy
  • General Term
  • Training terms
  • Managed Services Terms
  • Partner term
  • GET SOCIAL
MikroTik Value Added Distributor, MikroTik Training Centre, MikroTik Toronto, MikroTik Canada

Copyright © 2015 WirelessNetware. All rights reserved.

TOP