Archive for category Computing
Experiments in AI Art
Love it or hate it, AI art seems to be here to stay. This is a fairly touchy subject amongst artists and authors, some of whom are (justifiably, I believe) concerned about their livelihoods. Also, the legality and copyright issues around AI art are up in the air at the moment due to the way […]
In Praise of the Roguelike
Posted by in Computing on November 17, 2014
For the last few years, I’ve developed a new love in regards to video games, which is weird for a guy who has been playing video games pretty consistently for over 30 years. However, I recently ‘discovered’ one of first types of games, in fact the precursor to the standard CRPG: Roguelikes. What makes a roguelike isn’t […]
Early Christmas Present for Linux Geeks
Posted by in Computing on December 4, 2013
For those of you who run Linux, I thought I’d post up a backup script I was using (in a modified form) to do completely free backups of my Linux box to Google drive and Usenet Newsgroups. While both of these might sound like horrible ideas, considering that Usenet is public and Google drive is […]
Moving to the Dark Side: Linux vs. Windows from a Windows guy
For the last few months, I have done something that many of my geek friends would never have imagined: I have spent 90+% of my computing time using Linux. This is a huge deal for me for many reasons, but one of the biggest is that I have railed against Linux in the past. Furthermore, […]
Fixing That Which is Horribly, Horribly Broken
Posted by in Computing on May 5, 2013
Over the last 10 weeks or so, I’ve been back to teaching in my day job, which has largely been a good experience, despite how much my blog has suffered due to the changes in my schedule. We are now just getting into the really meaty stuff on interior routing protocols, covering RIP, EIGRP, and […]
EIGRP DUAL Route Processing Flow Chart
Posted by in Computing on May 4, 2013
As part of my work on the original Cisco: The Complete Reference book, I created a route processing flow chart for EIGRP’s DUAL Finite State Machine. This ultimately did not make it into the book in its original form, as it was way too big. However, I always found it helpful (and strangely beautiful, in a […]
Cisco Permit ACL to Deny Access to Private Address Blocks
Posted by in Computing on February 22, 2013
It’s pretty common these days to want to block private IP ranges on your firewall or router in order to protect from DDoS attacks. However, when setting one of these up at work recently, I found out that almost all of the existing posts on doing this with Cisco ACLs involve deny or mixed ACLs. […]
If you work in IT, and have never read either of these, you are deprived
These are without a doubt my two favorite IT-related humor sites. The first, Chronicles of George, is a supposedly true log of the support tickets for what is perhaps the most inept helpdesk tech ever. It’s worth a read just for the engrish alone. The second, The Bastard Operator from Hell, is an obviously fake […]
Troubleshooting Common Networking Problems with Wireshark, Pt. 6: Finding the Source of Network Delays
NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the last part in a six-part series about finding and solving many networking anomalies using the Wireshark network protocol analyzer. If you are new to the series, you can […]
Troubleshooting Common Networking Problems with Wireshark, Pt. 5: Broadcast Storms
NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the fifth part in a six-part series about finding and solving many networking anomalies using the Wireshark network protocol analyzer. If you are new to the series, you can […]
Recent Comments