-
Recent Posts
Recent Comments
Archives
- November 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- April 2015
- December 2013
- November 2013
- April 2013
- December 2012
- September 2012
- August 2012
- July 2012
- May 2012
- March 2012
- November 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- July 2009
Categories
Monthly Archives: December 2009
Cold Ride
I have a friend in Chicago and another in Boulder who talk about how nice it must be to ride all winter in the south. It kills me. Check the low for each night, because that is the temperature I … Continue reading
Posted in Cycling
Leave a comment
Dig Tricks
dig +short txt _netblocks.google.com dig -t SRV _kerberos._tcp.circus.com # get the address(es) for yahoo.com dig yahoo.com A +noall +answer # get a list of yahoo’s mail servers dig yahoo.com MX +noall +answer # get a list of DNS servers authoritative … Continue reading
Posted in Linux, Routing
Leave a comment
Riding Rickshaw
I live in Auburn Alabama and as you might have heard, it is a college town with a major college football team. In the fall, socializing revolves around football. I believe part of the reason is because there are no … Continue reading
Posted in Uncategorized
Leave a comment
SLA Lab
Over the last few days here at the Circus we have been playing around with trying to test our service level agreements (SLA). It came about because one of our off-campus sites was having connectivity issues and were extremely vocal … Continue reading
Posted in Routing
Leave a comment
SLA and MRTG
Over the last few days here at the Circus we have been playing around with trying to test our service level agreements (SLA). It came about because one of our off-campus sites was having connectivity issues and were extremely vocal … Continue reading
Posted in Code, Linux, Routing
Leave a comment
Encryption and Authentication
Wired Equivalent Privacy (WEP) Wired Equivalent Privacy (WEP) was the first implementation of wireless encryption, it has several weaknesses and should not be used. Weaknesses include: Weak encryption that has been broken Vulnerable to dictionary attacks Client trusts AP allowing … Continue reading
Posted in Routing
Leave a comment
The Problem with 10-12 Hour Days
2009-12-14 18:30:29 No wonder Google has such “extravagant” benefits. When you spend _all_ day and most nights at work there is precious little time for incidentals. The barber doesn’t stay open late and neither does the dry cleaner. Thankfully the … Continue reading
Posted in Thoughts
Leave a comment