Some users have recently had their accounts hijacked. It seems that the now defunct EVGA forums might have compromised your password there and seems many are using the same PW here. We would suggest you UPDATE YOUR PASSWORD and TURN ON 2FA for your account here to further secure it. None of the compromised accounts had 2FA turned on.
Once you have enabled 2FA, your account will be updated soon to show a badge, letting other members know that you use 2FA to protect your account. This should be beneficial for everyone that uses FSFT.
You're about right. We've basically got the same thing set up here.
Just delegate mysite.com in corporate dns to your ad and make sure corporate network can access dev net. That's ip connectivity, probably gonna have to push some routes etc. This is something net admins will have to do for you...
I'd love to see a smaller net connector but that's highly unlikely. Why? If you want ethernet distances with those speeds you need electrical characteristics on cable that small connectors can't provide. Or you need external converter which is then half an ethernet card already...
Hope i'm...
And if you got the flame update first (because public discussion =/= possibly found in the wild)? I think that's the point he was making.
But i agree, more automagic -> less to worry about.
Supposedly you can enable non-cisco certified sfps on cisco gear with
service unsupported-transceiver
NICs shouldn't have a problem i guess.
Should add, it's mostly "official certification", ie. administrative reason, why they don't work, not technological.
Also, there are _a lot_ of layer 2 features that switches support these days. Setting them up as a basic switch isn't really hard but a hefty manual is handy for all the fancy stuff like 802.1x, igmp snooping, L2 filtering etc.
CCNA teaches a lot of basic stuff that's not vendor specific, which is the real value here. If you know this stuff from working with another vendor, passing CCNA isn't hard either (if you learn a couple of cisco-specific configuration commands). And when you get the concepts, you won't have...
Ah, yes, I see you've addressed my points most adequately.
I'm also glad you understand what presumption of innocence means and how bail figures into (our) legal system.
Should you ever spend half a year locked up for some minor offense, well... You messed up, plain and simple. Maybe you...
I'm glad you have a sense of proportion.
Even if he was/is guilty of unlawful access and 14k$ in damages (and we know how they come up with these numbers), that warrants being stranded in a foreign country for 10 months, away from your life/family? I'm sure _coincidentally_ being in the...
This. You only have L2 switch from what i can see. No router = no connectivity. VLANs are like separate physical lans, so you need router to connect them.
While your comp. can access the whole /24 subnet, the other way around won't necessarily work (just like previous case). It really depends on default gw setup etc., since there also exists arp redirect mechanism. Also, ip broadcasts won't work.
Different subnets on their own are mostly useless...
Yup, it'll do arp lookup for static routes on interface/without default gw.
Not really. While 7 could reach 10, 10 couldn't reach 7 unless you set up static routes there as well. Another downside to not setting stuff up with correct netmasks.
Most of the time bridges/routers are transparent to and ignorant of protocols above layer 3 (that's ip), so they don't really care about netnames.
Now, since that's linux, I guess you could configure it to run samba and actively participate in windows networking, so it would build a list of...
Yup, that's great strategy if you're RSA customer that's wasn't affected yet: wait till you get hacked, then we'll tell you how they did it...
But two-factor auth is here to stay because there wasn't anything wrong with tokens as such (afaik). Tokens will get replaced and security-wise it'll be...
Well, the problem is, it's not just large networks. For example, lots of ISPs will give you /29 or such public subnet if you're not big enough to get provider independent space.
Besides, it looks like ISPs will be handing out /56 for ipv6 which is also on a non-nibble boundary.
Unmanaged switches just pass bpdus, so it will (should) work. But make sure stp is running on managed swith before plugging it in or get ready for network meltdown :)
Afaik it can't be done like that with Cisco. Basically, you have 3 options:
- give clients temp. ip and redirect all web traffic from there to portal (can be rfc1918)
- set up nat for every walled client ip (assuming you already have scripts that handle vlan assignement)
- get a proper solution...
Actually more traffic draws more power (meaning higher electricity bills/more cooling) but there's usually not that much of a difference :)
You don't need gbps lines for cloud. For most users/uses <10mbps is enough. BW caps are more of a problem. We're having them only because providers are...
But how well? And how much will that cost you? Thing is, cloud provider can afford experts in the field to handle that for you.
I'm not saying you should go cloud all the time, but reality is, a lot of customers can't take care of their data/security/whatever and having someone else do it for...
I mostly agree. But small outfits are imo even better suited for cloud services because economy of scale allows cloud provider to provide better/cheaper service than one could afford otherwise.
It's relaying, but i think forwarding could be used too. Afaik in postfix you setup transport map like
user@example.com smtp:[home.com]:1234
user@example.com can also be example.com to relay mail for whole domain (man transport is your friend).
Edit: Don't forget to allow mail for example.com...
How about linking an old thread (http://hardforum.com/showthread.php?t=1586295&highlight=jumbo+frame) or telling op to learn to use search button if you cba to find it?
Even if it's porn that drives progress, I say that's a good thing :)
If router does ipsec or not depends on your particular setup. Point is, even with ipv6 don't expect you'll be getting ipsec connections from anywhere you don't explicitly set up yourself (like vpn) for a long time. Besides, you don't have gigabit 'net speeds to really need that offloading, do...
Yup. It's probably a misconfiguration on isp's part that you can see them (or you should hope so :)
Thinking about it, when was the last time you restarted your modem? It should refetch it's configuration on boot, so you might try power cycling it and see if that fixes the problem.
This is "normal" for wireless networks, where you don't even get a public ip or perhaps outside western world.
It's normal for cable modems to have a private ip for management like spilly's seeing here but in practically every installation i've dealt with that's hidden from end user...
Cable modem always gets an IP address and usually it's from a private range. It usually then acts as some sort of bridge between lan and cmts.
I'd say those 10/192 ips are modem/cmts but that shouldn't really matter to you (and most help desk clerks are clueless about actual networks btw). Just...