Archive for category Computing

Experiments in AI Art

Love it or hate it, AI art seems to be here to stay. This is a fairly touchy subject amongst artists and authors, some of whom are (justifiably, I believe) concerned about their livelihoods. Also, the legality and copyright issues around AI art are up in the air at the moment due to the way […]

, ,

No Comments

In Praise of the Roguelike

For the last few years, I’ve developed  a new love in regards to video games, which is weird for a guy who has been playing video games pretty consistently for over 30 years. However, I recently ‘discovered’ one of first types of games, in fact the precursor to the standard CRPG: Roguelikes. What makes a roguelike isn’t […]

,

No Comments

Early Christmas Present for Linux Geeks

For those of you who run Linux, I thought I’d post up a backup script I was using (in a modified form) to do completely free backups of my Linux box to Google drive and Usenet Newsgroups. While both of these might sound like horrible ideas, considering that Usenet is public and Google drive is […]

,

No Comments

Moving to the Dark Side: Linux vs. Windows from a Windows guy

For the last few months, I have done something that many of my geek friends would never have imagined: I have spent 90+% of my computing time using Linux. This is a huge deal for me for many reasons, but one of the biggest is that I have railed against Linux in the past. Furthermore, […]

3 Comments

Fixing That Which is Horribly, Horribly Broken

Over the last 10 weeks or so, I’ve been back to teaching in my day job, which has largely been a good experience, despite how much my blog has suffered due to the changes in my schedule. We are now just getting into the really meaty stuff on interior routing protocols, covering RIP, EIGRP, and […]

, ,

No Comments

EIGRP DUAL Route Processing Flow Chart

As part of my work on the original Cisco: The Complete Reference book, I created a route processing flow chart for EIGRP’s DUAL Finite State Machine. This ultimately did not make it into the book in its original form, as it was way too big. However, I always found it helpful (and strangely beautiful, in a […]

, ,

No Comments

Cisco Permit ACL to Deny Access to Private Address Blocks

It’s pretty common these days to want to block private IP ranges on your firewall or router in order to protect from DDoS attacks. However, when setting one of these up at work recently, I found out that almost all of the existing posts on doing this with Cisco ACLs involve deny or mixed ACLs. […]

,

3 Comments

If you work in IT, and have never read either of these, you are deprived

These are without a doubt my two favorite IT-related humor sites. The first, Chronicles of George, is a supposedly true log of the support tickets for what is perhaps the most inept helpdesk tech ever. It’s worth a read just for the engrish alone. The second, The Bastard Operator from Hell, is an obviously fake […]

,

No Comments

Troubleshooting Common Networking Problems with Wireshark, Pt. 6: Finding the Source of Network Delays

NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the last part in a six-part series about finding and solving many networking anomalies using the Wireshark network protocol analyzer. If you are new to the series, you can […]

, , , ,

7 Comments

Troubleshooting Common Networking Problems with Wireshark, Pt. 5: Broadcast Storms

NOTE: You can now take course by the author with video and example traces on Wireshark. Check this post for more details. Author’s Note: This is the fifth part in a six-part series about finding and solving many networking anomalies using the Wireshark network protocol analyzer. If you are new to the series, you can […]

, , , ,

1 Comment