Feeds
75%
Huawei E5

Huawei E5 Wi-Fi/3G modem

Better known as the 3 MiFi

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Flipping out the battery - which, Huawei claims, is good for four hours' continuous usage; that's about right - reveals the modem's Sim card slot. On the side of the device is a separate bay, for Micro SDHC cards should you need to use the modem as USB Flash drive too - it isn't shared over Wi-Fi, though.

Huawei E5

The web UI presents the same controls any other router has

You'll need to remove the battery not only to slip in the Sim card but also to find out the unit's pre-loaded WPA password and the WLAN SSID. Our review sample had a different SSID to the one printed inside the battery compartment, though the WPA key proved to be correct.

Not that it made much difference. Huawei states that the E5 is compatible with Windows and Mac OS X. That may the case with the dial-up software you use when you want the E5 to operate as a dongle, but we couldn't get Mac OS X 10.6 to accept the WPA key, even with a '0x' in front to indicate it's a hexadecimal one.

A handy Windows XP machine would relay the key correctly, but modem and PC refused to communicate sufficiently well for the Huawei to provide the computer with an IP address. So to change the WPA key into something more sensible, we had to resort to connecting the E5 with a cable so we could access the device's admin web page.

This despite restoring the E5's settings to factory defaults.

Huawei E5

The UI is crude, but functional

Once in the management console, you have full access to the E5 and all the settings you'd expect from any standard Wi-Fi router. It isn't the best laid-out console we've seen - the options could be more logically organised, for example - but with a little exploration time you can find all the you need to enter your carrier's network login details and to set up your ad hoc WLAN the way you like it.

Security for virtualized datacentres

Next page: Verdict

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.