Tech
Computing, networking, and technology articles
Universal Free Backup Script for Linux
An in-progress Strategy/RPG based on the No Limits PnP gaming system
Tinder for important shit
Cross-references Epstein archive documents to recover inconsistently redacted text
Web interface for Unobfuscator — browse documents, view recovered redactions, and monitor your pipeline in real time
Discover new music based on the artists you already love
New Udemy Course Announcement
My new Udemy course is finally live for the low introductory price of $19.99. Check it out if you are interested in Wireshark. https://www.udemy.com/mastering-network-troubleshooting-with-wireshark/
In Praise of the Roguelike
For the last few years, I’ve developed a new love in regards to video games, which is weird for a guy who has been playing video games pretty consistently for over 30 years. However, I recently ‘disco
Early Christmas Present for Linux Geeks
For those of you who run Linux, I thought I’d post up a backup script I was using (in a modified form) to do completely free backups of my Linux box to Google drive and Usenet Newsgroups. While both o
Moving to the Dark Side: Linux vs. Windows from a Windows guy
For the last few months, I have done something that many of my geek friends would never have imagined: I have spent 90+% of my computing time using Linux. This is a huge deal for me for many reasons,
EIGRP DUAL Route Processing Flow Chart
As part of my work on the original Cisco: The Complete Reference book, I created a route processing flow chart for EIGRP's DUAL Finite State Machine . This ultimately did not make it into the bo
Fixing That Which is Horribly, Horribly Broken
Over the last 10 weeks or so, I've been back to teaching in my day job, which has largely been a good experience, despite how much my blog has suffered due to the changes in my schedule. We are
Cisco Permit ACL to Deny Access to Private Address Blocks
It’s pretty common these days to want to block private IP ranges on your firewall or router in order to protect from DDoS attacks. However, when setting one of these up at work recently, I found out t
If you work in IT, and have never read either of these, you are deprived
These are without a doubt my two favorite IT-related humor sites. The first, Chronicles of George , is a supposedly true log of the support tickets for what is perhaps the most inept helpdesk tech eve
Troubleshooting Common Networking Problems with Wireshark, Pt. 6: Finding the Source of Network Delays
NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the last part in a six-part series about finding and so
Troubleshooting Common Networking Problems with Wireshark, Pt. 5: Broadcast Storms
NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the fifth part in a six-part series about finding and s
Troubleshooting Common Networking Problems with Wireshark, Pt. 4: Application Layer Inspection Problems
NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the fourth part in a six-part series about finding and
Troubleshooting Common Networking Problems with Wireshark, Pt. 3: MTU Problems
NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the third part in a six-part series about finding and s
Troubleshooting Common Networking Problems with Wireshark, Pt. 2: TCP Retransmissions
NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the second part in a six-part series about finding and
Troubleshooting Common Networking Problems with Wireshark, Pt. 1: TCP Checksum Incorrect ‘Error’
Author’s Note: This is the first part in a six-part series about finding and solving many networking anomalies using the Wireshark network protocol analyzer. I originally wrote these for the Microsoft
Linux and Networking: Too Much Fail for One Configuration
So, this is a problem that I've spent a day or so working on at work, and it goes like this… A router (Linux, running ZeroShell ) is configured with three interfaces, as shown in the follo
Engineer to English Translation Guide
A colleague of mine (thanks Carole!) remarked the other day how I should make a T-shirt with a translation guide that roughly equates what and engineer says with what they mean and/or what one can exp
Jim McBee’s Mostly Exchange Web Log: The IT Curmudgeon
I don't normally do this, but here's something centered on IT from Jim McBee's blog. You should get a kick out of it if you have been in IT for any extended period, and there's
The Death of Principles
So, for almost two years, I’ve been using an Android phone , partially due to the limitations of the iPhone platform, and partially due to my unswerving hatred of Apple. This weekend, I broke down and
On the Topic of Mind Uploading…
Exploring the concept of mind uploading and the technological singularity.
Weekend hard disk adventures…and two must-have tools
Well, I bought and installed a shiny new WD 1.5 TB hard disk this weekend, and I have to say it went better than expected, despite the fact that it took a day to complete. The physical installation, o
Silent DAW Build
One thing I have noticed missing from most PC build guides is a good guide to building a silent DAW, which seems odd to me. After building no less than four DAWs over the years, I have come to appreci
Why current AI research is doomed to failure
By Brian Hill, One-Man Think-Tank and Resident Pseudo-Scientist Let me begin this little rambling with a disclaimer: I am not a scientist; I don't even play one on TV. This entire article is bas