Posts Tagged geeky

In Praise of the Roguelike

For the last few years, I’ve developed  a new love in regards to video games, which is weird for a guy who has been playing video games pretty consistently for over 30 years. However, I recently ‘discovered’ one of first types of games, in fact the precursor to the standard CRPG: Roguelikes. What makes a roguelike isn’t […]

,

No Comments

Early Christmas Present for Linux Geeks

For those of you who run Linux, I thought I’d post up a backup script I was using (in a modified form) to do completely free backups of my Linux box to Google drive and Usenet Newsgroups. While both of these might sound like horrible ideas, considering that Usenet is public and Google drive is […]

,

No Comments

Moving to the Dark Side: Linux vs. Windows from a Windows guy

For the last few months, I have done something that many of my geek friends would never have imagined: I have spent 90+% of my computing time using Linux. This is a huge deal for me for many reasons, but one of the biggest is that I have railed against Linux in the past. Furthermore, […]

No Comments

Fixing That Which is Horribly, Horribly Broken

Over the last 10 weeks or so, I’ve been back to teaching in my day job, which has largely been a good experience, despite how much my blog has suffered due to the changes in my schedule. We are now just getting into the really meaty stuff on interior routing protocols, covering RIP, EIGRP, and […]

, ,

No Comments

EIGRP DUAL Route Processing Flow Chart

As part of my work on the original Cisco: The Complete Reference book, I created a route processing flow chart for EIGRP’s DUAL Finite State Machine. This ultimately did not make it into the book in its original form, as it was way too big. However, I always found it helpful (and strangely beautiful, in a […]

, ,

No Comments

Site Outage

Under the subheading of ‘Why is this hard?’, I decided to transfer my domain to a new registrar, going from SOPA-loving, outage-prone Godaddy to what seemed to be highly rated (and much cheaper) 1&1. This was, by the way, mostly prompted by the exorbitant rates Godaddy wanted to charge me for renewal, something like $40 […]

, ,

No Comments

Cisco Permit ACL to Deny Access to Private Address Blocks

It’s pretty common these days to want to block private IP ranges on your firewall or router in order to protect from DDoS attacks. However, when setting one of these up at work recently, I found out that almost all of the existing posts on doing this with Cisco ACLs involve deny or mixed ACLs. […]

,

3 Comments

If you work in IT, and have never read either of these, you are deprived

These are without a doubt my two favorite IT-related humor sites. The first, Chronicles of George, is a supposedly true log of the support tickets for what is perhaps the most inept helpdesk tech ever. It’s worth a read just for the engrish alone. The second, The Bastard Operator from Hell, is an obviously fake […]

,

No Comments

Troubleshooting Common Networking Problems with Wireshark, Pt. 6: Finding the Source of Network Delays

Author’s Note: This is the last part in a six-part series about finding and solving many networking anomalies using the Wireshark network protocol analyzer. If you are new to the series, you can find part 1 here, and the whole series here.It may seem surprising in this age of ubiquitous Gigabit Ethernet connections, but many […]

, , , ,

7 Comments

Troubleshooting Common Networking Problems with Wireshark, Pt. 5: Broadcast Storms

Author’s Note: This is the fifth part in a six-part series about finding and solving many networking anomalies using the Wireshark network protocol analyzer. If you are new to the series, you can find part 1 here, and the whole series here.Broadcast storms occur when a host floods the subnet with broadcasts. This is not […]

, , , ,

1 Comment