|
AreWeDrunkYet posted:One way of thinking about it is that you will have no choice but to specialize over the course of your career, assuming you are in non-managerial positions of increasing responsibility. The hard part is going to be maintaining knowledge outside of your specialization - but making the effort to do so will make you more valuable since you'll be able to speak coherently to other people outside of your specialization. As for specializing goes, this hits the nail on the head. My department is very open, the team runs the entire infrastructure except for network and database. We still have our own in-house specialists. I'm the automation guy, we have a storage guy who is also an ex-developer, an old grey-beard who has every RFC memorized and has loads of obscure knowledge, a windows guy for the 50 or so windows production servers we run. The rest are still figuring themselves out. Even though we have these specialists, I still get to play in their realms and they get to play in mine. We also are first point of escalation for everything in the environment, so unless the red flashing light specifically tells the techs that the problem is for a DBA, the call comes to us first and we get to figure out that it is a dba issue and then have it escalated to them.
|
# ? Jul 26, 2014 16:48 |
|
|
# ? Jun 10, 2024 12:02 |
|
Geschi posted:I'm actually doing this right now, although using just KSC and its been pretty painless. We have a three task sequence for machines, 1. Install Network Agent. 2. Remove previous AV and reboot. 3. Install Kaspersky AV. Worst thing, the consultant that projected the migration had the brilliant idea of putting the KSC server off site, so whenever I launch the AV task for some clients, the WAN link slows down to a crawl... Users have been complaining a lot. I stayed there til 2 AM on thursday and only managed to finish 1st through 3rd floor, with some computers still missing because people take their laptops home. When they come in the morning KSC automatically detects them as belonging to the subnet and starts launching the AV clients to everyone who wasn't there... This hasn't been easy, not everything is foreseeable and the tool sucks. Two or three more nights and it should be done. I kind of just want to launch a building wide McAfee uninstall and then launch a Kaskersky task for everyone but that would take so loving long.
|
# ? Jul 26, 2014 17:25 |
|
Vendictus Prime posted:Has anyone used CBTNuggets to help get their CCENT and what is your opinion of CBT's content for the cert? good or not? CBT Nuggets is awesome but it's expensive and don't expect to be able to pass the test or do it in the real world with just the videos.
|
# ? Jul 26, 2014 17:43 |
|
Dilbert As gently caress posted:If the use case is labs and non confidential data, just go with google butt, or if an institution go bing/google. What features are you looking for? Dont need much. Just want to spin up a 2012 DC, SQL, Win 7/8 VM's. Vendictus Prime posted:Has anyone used CBTNuggets to help get their CCENT and what is your opinion of CBT's content for the cert? good or not? It's good as a high level overview. Your better off reading the Odom or Lamme books and labbing first and then watching the video's as review.
|
# ? Jul 26, 2014 18:32 |
|
Vendictus Prime posted:Has anyone used CBTNuggets to help get their CCENT and what is your opinion of CBT's content for the cert? good or not? It's good and the guy doing the video is REAAAALLY ENTHUSIASTIC (also about things not really related to the content)
|
# ? Jul 26, 2014 18:48 |
|
Can anyone explain to me any downsides (if any) to using dual psu and dual sups in a core switch rather than two chassis for redundancy? Also how over subscribed should uplinks be between a collapsed core and access layer. Mainly for windows 7 workstations with typical office use. I've read 20:1 is pretty acceptable, does that sound right? ToG fucked around with this message at 19:30 on Jul 26, 2014 |
# ? Jul 26, 2014 19:23 |
|
Jeoh posted:It's good and the guy doing the video is REAAAALLY ENTHUSIASTIC (also about things not really related to the content) Seriously, he would get so distracted it was irritating.
|
# ? Jul 26, 2014 19:23 |
|
Vendictus Prime posted:Has anyone used CBTNuggets to help get their CCENT and what is your opinion of CBT's content for the cert? good or not? Used it, loved it. Got me through the CCENT and CCNA. I supplemented the videos with chapters from the official cert guides when I needed some more depth on the subjects (which was often). And yes, Jeremy Cioara is very passionate (some would say overly) about the subject matter, and it comes through loud and clear in his delivery. It's a welcome change from a video of someone narrating a PowerPoint slide, though.
|
# ? Jul 26, 2014 19:25 |
|
Almost all their video people are super passionate. I've watched Windows Server videos and the guy was unbelievably excited to be talking about the most mundane poo poo imaginable.
|
# ? Jul 26, 2014 19:28 |
|
Yeah that's probably James Conrad, he's so awful. I've seen some new 2012 videos which are by Greg Shields and they're several orders of magnitude better. As mentioned, they're best as review and high overview. I've taken to just letting them play as background noise.
|
# ? Jul 26, 2014 19:43 |
|
I was just browsing a relatively well known content sharing website, one of those Upworthy type aggregates that wants your clicks. You'll never believe what this woman found when she opened this can of soda! (She found that soda has sugar in it, thanks for the click). Anyway, I click a link, I click another, I click another, then the website implodes on me and: Whaaaat the gently caress security. e: Oops I left an IP uncovered, but ahh well, servers have IPs, do what you will with that info.
|
# ? Jul 26, 2014 19:57 |
|
MC Fruit Stripe posted:I was just browsing a relatively well known content sharing website, one of those Upworthy type aggregates that wants your clicks. You'll never believe what this woman found when she opened this can of soda! (She found that soda has sugar in it, thanks for the click). Anyway, I click a link, I click another, I click another, then the website implodes on me and: Goddamn, I love wordpress.
|
# ? Jul 26, 2014 20:00 |
|
ToG posted:Can anyone explain to me any downsides (if any) to using dual psu and dual sups in a core switch rather than two chassis for redundancy? None? It comes down to how many line cards you need to handle your needs. Dual PSUs in HA is always a good idea even if you're running two chassis. We ran as many as 240:1 (pure gigabit) at the access layer and never pegged the uplink, even in the mornings. If it's typical office use, I wouldn't worry about oversubscription too much; for us it was more important to have spaces on the fiber panel open because we were running as many as 5 physically separate networks to the closets, but your needs might obviously be different if your employees are pushing uncompressed video or other large files on a routine basis. Plus, the utility of redundant connections at the access layer is usually mitigated by the fact that the fiber is grouped together and running separate conduit for redundancy for employees isn't worth the cost. e: The only other time I can think of where you'd absolutely want to use two chassis would be if you had such a high normal traffic load that you wanted to do an STP VLAN load balancing configuration, but that's about it. psydude fucked around with this message at 20:36 on Jul 26, 2014 |
# ? Jul 26, 2014 20:24 |
|
psydude posted:None? It comes down to how many line cards you need to handle your needs. Dual PSUs in HA is always a good idea even if you're running two chassis. Vulture Culture fucked around with this message at 20:46 on Jul 26, 2014 |
# ? Jul 26, 2014 20:43 |
|
psydude posted:None? It comes down to how many line cards you need to handle your needs. Dual PSUs in HA is always a good idea even if you're running two chassis. I was looking at a design suggested by someone in our IT department which was effectively a 10-gig daisy chain between switches. My brain couldn't really wrap itself around that concept. I'm putting together a proposal for a collapsed core design instead with a chassis switch at the core and 2 gig uplinks to the core. This is my first real-world design so I just want to have it nailed down. I believe my option might even be cheaper.
|
# ? Jul 26, 2014 21:42 |
|
nvm dunno if I should post a hack for any 2008 or older windows system.
|
# ? Jul 27, 2014 03:04 |
|
Dilbert As gently caress posted:nvm dunno if I should post a hack for any 2008 or older windows system. It's time for your weekly drunk saturday night posting. Don't let the thread down.
|
# ? Jul 27, 2014 03:11 |
|
three posted:It's time for your weekly drunk saturday night posting. Don't let the thread down. Nah, heart is acting up so I am not drinking.
|
# ? Jul 27, 2014 03:14 |
|
I'm exhausted just thinking about being you
|
# ? Jul 27, 2014 03:16 |
|
Dilbert As gently caress posted:nvm dunno if I should post a hack for any 2008 or older windows system. Do it I loving double dog dare you.
|
# ? Jul 27, 2014 03:24 |
|
Dilbert As gently caress posted:nvm dunno if I should post a hack for any 2008 or older windows system. Did you decompile the nt kernel and find the exact interrupts to send to destroy every computer on the interwebs? Are you a master hacker now too? Lemme guess. You figured out the exact frequency to send to get every monitor to cause seizures and are going to use this power to rob the Bank of England.
|
# ? Jul 27, 2014 03:36 |
|
jaegerx posted:Did you decompile the nt kernel and find the exact interrupts to send to destroy every computer on the interwebs? Are you a master hacker now too? Lemme guess. You figured out the exact frequency to send to get every monitor to cause seizures and are going to use this power to rob the Bank of England. What the gently caress are you talking about?
|
# ? Jul 27, 2014 03:38 |
|
Dark Helmut posted:I'm exhausted just thinking about being you
|
# ? Jul 27, 2014 03:42 |
|
jaegerx posted:Did you decompile the nt kernel and find the exact interrupts to send to destroy every computer on the interwebs? Are you a master hacker now too? Lemme guess. You figured out the exact frequency to send to get every monitor to cause seizures and are going to use this power to rob the Bank of England. He's probably going to take down SA first
|
# ? Jul 27, 2014 03:47 |
|
Is it copying the Adminstrator's command prompt over the Ease of Access center on the login screen? Cause I need that feature to fix broken DCs
Roargasm fucked around with this message at 03:58 on Jul 27, 2014 |
# ? Jul 27, 2014 03:55 |
|
Instead of just looking for some poo poo to complain about, can we just get back onto IT and stuff? Things that use symbolic links without salted links are a danger over looked, and allowing run as Admin even before login is dangerous.Roargasm posted:Is it copying the Adminstrator's command prompt over the Ease of Access center on the login screen? Cause I need that feature to fix broken DCs Basically, the problem is it still exists. You can do MUCH more with it than what you think if you know CMD/PS; it's actually pretty sad. Dilbert As FUCK fucked around with this message at 03:57 on Jul 27, 2014 |
# ? Jul 27, 2014 03:55 |
|
If someone can physically touch your machine, I would always expect them to be able to get access to it.
|
# ? Jul 27, 2014 04:06 |
|
Roargasm posted:If someone can physically touch your machine, I would always expect them to be able to get access to it. True But it depends on the environment, and setup of the domain. If it's a lazy admin who does lovely CA trusts, just \\dc\C$ or do something in \\dc\%other%\ Might be nothing but I thought I'd share a bit of it. No idea why people jumped the gun unless they just want something dumb. Dilbert As FUCK fucked around with this message at 04:16 on Jul 27, 2014 |
# ? Jul 27, 2014 04:13 |
|
You don't seem to understand the difference between "I just learned something" and "I am the sole human to know of this, I must be god's instrument on earth". Whatever it is you're prattling on about, a lot of people know about it.
|
# ? Jul 27, 2014 04:38 |
|
MC Fruit Stripe posted:You don't seem to understand the difference between "I just learned something" and "I am the sole human to know of this, I must be god's instrument on earth". Whatever it is you're prattling on about, a lot of people know about it. That's cool, I just posted I didn't feel comfortable posting the how to. Did I say I was the end all about it? No, I didn't; I just said I didn't feel like posting it. Are we going to post about things that I didn't say and egg me on to something stupid? or can we get back to talking about IT, and therefor working on it and tips we know. Dilbert As FUCK fucked around with this message at 04:44 on Jul 27, 2014 |
# ? Jul 27, 2014 04:40 |
|
Did you guys hear about this OpenSSL bug?
|
# ? Jul 27, 2014 04:46 |
|
jaegerx posted:Did you guys hear about this OpenSSL bug? It's actually surprising how many people haven't updated services like vcenter, or other services.
|
# ? Jul 27, 2014 04:51 |
|
Roargasm posted:Is it copying the Adminstrator's command prompt over the Ease of Access center on the login screen? Cause I need that feature to fix broken DCs Holy poo poo I did not know this was a thing. That's pretty clever, honestly.
|
# ? Jul 27, 2014 05:11 |
|
jaegerx posted:Did you guys hear about this OpenSSL bug? Oh god, it's the weekend and I haven't gotten any emails about one. Please don't let there be another bug which didn't follow the cve process
|
# ? Jul 27, 2014 05:26 |
|
evol262 posted:Oh god, it's the weekend and I haven't gotten any emails about one. Please don't let there be another bug which didn't follow the cve process
|
# ? Jul 27, 2014 05:39 |
|
evol262 posted:Oh god, it's the weekend and I haven't gotten any emails about one. Please don't let there be another bug which didn't follow the cve process OpenSSL and heart bleed is a bug, I get but how man people looked into what sub services it effecting on their environment? It's stupid I know but why not just speak what you know? I guess my stance is, while the vulnerability is know, what are we doing to protect our company from it? How can we help others to take the same steps? Dilbert As FUCK fucked around with this message at 06:09 on Jul 27, 2014 |
# ? Jul 27, 2014 06:05 |
|
If it's on the Internet it's insecure.
|
# ? Jul 27, 2014 06:15 |
|
jaegerx posted:If it's on the Internet it's insecure. So we shouldn't talk about it? I agree it's wide open but why not address it? Not everyone is on the same learning level as you or I. Maybe it helps someone out; and at the end of the day helping others is what matters..
|
# ? Jul 27, 2014 06:20 |
|
There's several threads dedicated to discussing bugs and vulnerabilities. This isn't one of them.
|
# ? Jul 27, 2014 06:36 |
|
|
# ? Jun 10, 2024 12:02 |
|
psydude posted:There's several threads dedicated to discussing bugs and vulnerabilities. This isn't one of them. Did a scroll and read all 3 pages of OP's. What are they because I didn't see them. Where is the vulnerability thread? If we have a sec thread or something dedicated to bugs/vulnerabilites; link me and I'd like to post there because I missed it. Dilbert As FUCK fucked around with this message at 06:51 on Jul 27, 2014 |
# ? Jul 27, 2014 06:43 |