ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Topics
    2. pmoncho
    3. Best
    • Profile
    • Following 2
    • Followers 0
    • Topics 29
    • Posts 1,142
    • Groups 0

    Posts

    Recent Best Controversial
    • RE: Home Server suggestions

      @fuznutz04 said in Home Server suggestions:

      @pmoncho said in Home Server suggestions:

      You can check out orangecomputers.com They have custom build DL380's.
      Build away.

      @pmoncho said in Home Server suggestions:

      You can check out orangecomputers.com They have custom build DL380's.
      Build away.

      Orange computers is awesome. Thatโ€™s where I got my home server ( a Dell R730)

      After my wedding next month, I will finally get my home server. @travisdh1 showed me the way. ๐Ÿ™‚

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: Non-IT News Thread

      @scottalanmiller said in Non-IT News Thread:

      @pmoncho said in Non-IT News Thread:

      As for Patents, those are a form of government control and a good one. It its not without its issue though.

      I'm not a believer in patents. There's some sound idea behind it.... if you invent something you should have some advantage. But you already have an advantage, making it a monopoly hurts consumers. Patents work against capitalism and free markets and all traditional systems. The idea that "writing something down first" makes it yours is a problem. Once in a while, we can justify it by example, but rarely. There is hardly a patented item ever made that I think worked out. The idea of patents has nothing to do with invention, but exists to make it essentially impossible for individuals and small companies to compete and to shift money to big companies and lawyers.

      Patents do have their issues, no doubt (can we say zmodem and rounded corners). IMHO, I believe having some form of protection for one's idea spurs further innovation. Putting a few billion dollars and many years into development of a product only to have it abused by another in one month is not a good thing.

      The system only needs a few changes but my main changes would be, shorter term limits and very short term limits for patents without some type of prototype.

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: Email server options

      @Dashrender said in Email server options:

      @scottalanmiller said in Email server options:

      @Dashrender said in Email server options:

      Now fine, you said you have some existing hardware that you can use for it, but will be replacing it in a year or two - that cost should definitely be added in.

      Should factor, for sure. But it is often super cheap. Zimbra or MailCow use very few resources compared to something like Exchange. The per user cost gets super low in most cases. If you want a top end cost, price it out on Vultr, Digital Ocean, or Linode and see what it would cost that way. It'll be "low". And running it on your own will always be way less. So its super conservative.

      Interesting. My issue on my VM platform is storage - I don't have a 500 GB+ left over to offer all 100 of my users 5+ GB

      I wish I could get my 5+ GB users to understand how useless their email hoarding is. Half the emails they keep for 8+ years are irrelevant to anything today.

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: Non-IT News Thread

      @scottalanmiller said in Non-IT News Thread:

      @Dashrender said in Non-IT News Thread:

      @scottalanmiller said in Non-IT News Thread:

      @pmoncho said in Non-IT News Thread:

      Putting a few billion dollars and many years into development of a product only to have it abused by another in one month is not a good thing.

      There is already protection for that, though. No need for patents.

      What is that protection?

      Trade secrets.

      Trade secrets is just a form of short term internal patent with the ability to create high short term pricing. The company would just calculate how long it would take for another to reverse engineer their product and add that to the intial cost. Thus, drug A will be three times the amount vs being able to have a 10 year patent. (just what I think would happen)

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: Email server options

      @Dashrender said in Email server options:

      @pmoncho said in Email server options:

      @Dashrender said in Email server options:

      @pmoncho said in Email server options:

      @Dashrender said in Email server options:

      @scottalanmiller said in Email server options:

      @Dashrender said in Email server options:

      Now fine, you said you have some existing hardware that you can use for it, but will be replacing it in a year or two - that cost should definitely be added in.

      Should factor, for sure. But it is often super cheap. Zimbra or MailCow use very few resources compared to something like Exchange. The per user cost gets super low in most cases. If you want a top end cost, price it out on Vultr, Digital Ocean, or Linode and see what it would cost that way. It'll be "low". And running it on your own will always be way less. So its super conservative.

      Interesting. My issue on my VM platform is storage - I don't have a 500 GB+ left over to offer all 100 of my users 5+ GB

      I wish I could get my 5+ GB users to understand how useless their email hoarding is. Half the emails they keep for 8+ years are irrelevant to anything today.

      Sadly, my boss constantly likes to point out how she found an email from 8 years ago that helped her today.

      The reality is - I knew email would be a huge storage sink if I didn't squash it from day one. Normal users get 500 Megs - yep, 1/2 gig for mail. Admins get 1 Gig, Drs get unlimited, but most live in well under 1 Gig.
      My boss has the largest mailbox at 6 Gig currently along with 4 PSTs different points where we've removed old data from the live mailbox. She likely has well over 20 Gigs of email data.

      I tried to do the same thing until the boss tells me, let User A have more, then the word spread. Complain to the boss and then boss tells me. My arguments fall on deaf ears and I have to comply with the request.

      I get that from time to time - But then I tell the boss - hey, if you keep this up, I'm going to need to spend $1000 to add more storage, it's kinda an all or nothing... i.e. you make me up two more users, and I'll be spending that $1000. That makes them stop and ponder if those people really need more space.

      That is why I would like to get to O365. If the boss sees the recurring bill, she will see the light.

      I mean, who the heck needs multiple 800KB PDF attachments from Medicaid about a new entry into their online manual? Uhhhh, its an online manual, you can search it anytime you like until you retire. Much easier to search the Medicaid manual vs our email.

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: Non-IT News Thread

      @scottalanmiller said in Non-IT News Thread:

      @pmoncho said in Non-IT News Thread:

      @scottalanmiller said in Non-IT News Thread:

      @Dashrender said in Non-IT News Thread:

      @scottalanmiller said in Non-IT News Thread:

      @pmoncho said in Non-IT News Thread:

      Putting a few billion dollars and many years into development of a product only to have it abused by another in one month is not a good thing.

      There is already protection for that, though. No need for patents.

      What is that protection?

      Trade secrets.

      Trade secrets is just a form of short term internal patent with the ability to create high short term pricing. The company would just calculate how long it would take for another to reverse engineer their product and add that to the intial cost. Thus, drug A will be three times the amount vs being able to have a 10 year patent. (just what I think would happen)

      No, it's quite different. They are quite the opposite. One is "figure things out and make money on your knowledge" the other is "file legal paperwork and make money based on the legal system and government"

      In the end, Product A's price will include the reverse engineering fee until Product B is created and sold. Doesn't matter if it is held as a trade secret within the company or the entire schematic laid out on paper for all to see.

      If a protected time period doesn't exist, initial pricing will be three to five times more than it is already. Product A will be duplicated and Company A has to get on the ball for the next drug using the extra Billions it received from Product A's initial HUGE price.

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: Fail2ban on load balancer

      @IRJ said in Fail2ban on load balancer:

      @scottalanmiller said in Fail2ban on load balancer:

      @wrx7m So the real question for geo-blocking is...

      Pro: Blocks attacks from script kiddies and other annoying but essentially non-threatening entities.
      Con: Blocks a small number of potential customers, likely causing them to not do business with you (because they don't know that they can.)

      So put a dollar value on each, or ask your CFO/CEO to do so. How much is the value of the annoyance versus how much is the value of the lost revenue?

      Both numbers are small. For me, I can't even imagine the second number, it's got to be tiny, but I can't estimate it. The first number I can estimate, approaching zero. Script kiddie attacks, those that can't change their IPs and aren't targeted, don't pose a real threat. They use a trivial amount of bandwidth, fill up some logs, but that's it. They don't impact me. So while I can't put a number of the "con", I know that there is one even if it is $5. But I can put a value on the "pro", and it is essentially zero. So for me, that's a crystal clear "don't take this risk without another factor" answer.

      I can see the requirement from their point of view, though. If you are breached and by chance it happens to be from a Russian IP, what is the first thing any security firm is going to ask. Why weren't you blocking IPs from high risk locations?

      Its become a CYA product and that's about it.

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: What Are You Doing Right Now

      @Dashrender said in What Are You Doing Right Now:

      @pmoncho said in What Are You Doing Right Now:

      @Dashrender said in What Are You Doing Right Now:

      @pmoncho said in What Are You Doing Right Now:

      @Dashrender said in What Are You Doing Right Now:

      @brandon220 said in What Are You Doing Right Now:

      @Dashrender The XPS are nice, but I doubt I would ever use the "tablet" function.

      Then buy the laptop version.

      XPS 15 is pretty sweet.

      Just wondering if others purchase warranties or not? While many of us could fix normal issues, I always tell normal users to purchase it but I normally limit myself to basic just because I don't want to have to deal with finding parts if they are needed.

      For work, I considered it, I bought 25 laptops and hot damn... it was a fortune to add warranties to them all - instead I just bought an extra two laptops to act as a replacement, still saved a bundle over warranty cost.

      Good call. Makes total sense. Unfortunately, I have never been in that situation. I get to play with buying RAM and SSD's off Ebay to keep the 7 year olds running.

      I believe it was you that mentioned you liked the XPS because of the "nose camera." Do you use a different camera instead (if you have web meetings)? Or just use your phone?

      uh - what? no, I disliked the older XPS because of that camera placement... they have changed it.. put it back at the top where it belongs....

      Dang, just noticed that the XPS doesn't have a numeric keypad. Bummer. Back to latitude I go. Although, thinking of checking out the MSI's on Amazon

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: Scripting - How do you store your credentials and call them later?

      @IRJ

      I come mentally prepared with my powerful Crane! ๐Ÿ™‚
      alt text

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: Non-IT News Thread

      @scottalanmiller said in Non-IT News Thread:

      @pmoncho said in Non-IT News Thread:

      Okay, what reason does one need for the President's tax return? The only acceptable reason would be to know how he would spend money. Where it could be spent or put in someone's pocket.

      No, this is false.

      Have you not followed the news at all? The big reasons are that we need to know 1) if his election was honest and valid and 2) if he is being funded or beholded to foreign powers.

      Honest and valid has absolutely nothing to do with a tax return. He stated that he is audited every year and it is the IRS's job to keep him honest and valid.

      He gave up the business to his children and has no control over its workings, there not beholden to anyone. So still no reason for tax records.

      If Congress felt the President needed to release their tax records, they would make a law for the President to do so. After four years, Nancy still hasn't lifted her finger to do so.

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: GPO issue

      @WLS-ITGuy said in GPO issue:

      @Dashrender said in GPO issue:

      I would change this up by applying your GPOs to the OU above these WLS OUs, then set filters to only apply to the users you want.

      So in the case of the Library, you've already created a security group, so you'll grant permissions to that group.

      Then you'll need to create a WLS-Faculty security group and do the same with it's GPO.

      So the GPOs would be at 'domain level' not in the OU level...Like this?

      alt text

      Then I apply the security groups from there? That makes sense.

      Correct. Now any user in the Domain (aka located in any OU), within the security group you created should have the GPO applied.

      Side note - I ALWAYS make sure I set security filter BEFORE I enable the GPO. The last thing you want is some user logging in after you save the GPO and getting access to items they should not.

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: Just for Fun - Network + Journey

      @WrCombs said in Just for Fun - Network + Journey:

      @Obsolesce said in Just for Fun:

      I'm sure u can find lots of practice tests for it from searching online.

      You're right, i can find a bunch ... but that takes away from the discussion that comes with the questions/answers..

      If you do decide to go the practice test route, I would recommend going to Udemy and purchase the practice tests from Dion Training and Mike Meyers. The modules are rather cheap at $9.99 and you can get over 500 questions for roughly $30.

      In addition, you can hop over to https://www.professormesser.com/ and take his network challenge questions. Don't forget to go through questions from previous months and years. This can add up to another 100 questions.

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: Windows 2019 Slower Than Windows 2012 R2

      @scottalanmiller said in Windows 2019 Slower Than Windows 2012 R2:

      @DustinB3403 said in Windows 2019 Slower Than Windows 2012 R2:

      And more to the point did enabling SMB1 resolve the issue?

      Won't know till we get a window to reboot it.

      On SW (emoji's won't work for some reason), a post seems slightly related because it was dealing with SMB shares on 2019.

      It linked to MS site for the fix -

      https://social.technet.microsoft.com/Forums/en-US/8aa6a88c-ffc8-4ede-abfc-42e746ff5996/windows-server-2019-hyperv-guest-on-windows-server-2019-hyperv-host?forum=winserverhyperv&prof=required

      It mentioned Disabling RCS on the vswitch and/or the NIC itself.

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: Just for Fun - Network + Journey

      @WrCombs said in Just for Fun - Network + Journey:

      @scottalanmiller said in Just for Fun - Network + Journey:

      What is the best way to secure the most vulnerable attack vector for a network?

      Choices:

      A] Remove unneeded services running on the servers
      B] Provide end-user awareness training for office staff
      C] Update all antivirus definitions on workstations and servers
      D] Use biometrics and SSO for authentication

      Hey First Question - Thanks Scott

      My first instinct D]Use biometrics and SSO for Authentication

      The key words in the question is "most vulnerable attack vector" so IMHO, D] would incorrect.

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: Spinning rust, how long do you keep it spinning?

      @Pete-S said in Spinning rust, how long do you keep it spinning?:

      Do you replace or upgrade disk arrays based on their age?
      Or do you let them spin until they die?

      This is the debate I have going in my head as you can see from my recent post about my dying Dell drives. Server is still under warranty but I keep double checking my backups to verify they are good.

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: Just for Fun - Network + Journey

      @WrCombs said in Just for Fun - Network + Journey:

      @pmoncho said in Just for Fun - Network + Journey:

      @WrCombs said in Just for Fun - Network + Journey:

      @pmoncho said in Just for Fun - Network + Journey:

      @WrCombs said in Just for Fun - Network + Journey:

      @scottalanmiller said in Just for Fun - Network + Journey:

      What is the best way to secure the most vulnerable attack vector for a network?

      Choices:

      A] Remove unneeded services running on the servers
      B] Provide end-user awareness training for office staff
      C] Update all antivirus definitions on workstations and servers
      D] Use biometrics and SSO for authentication

      Hey First Question - Thanks Scott

      My first instinct D]Use biometrics and SSO for Authentication

      The key words in the question is "most vulnerable attack vector" so IMHO, D] would incorrect.

      Well People would be the most vulnerable

      so B?

      Correct, B. @scottalanmiller will have to confirm though.

      I thought that too, but then I thought that was too easy and that he probably was meaning something else .

      I get that. There are actually many of those on the practice tests. Just when you think, "Nah, that can't be right..." Occam's razor strikes again.

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: TPM module - what is it used for?

      @Dashrender said in TPM module - what is it used for?:

      @black3dynamite said in TPM module - what is it used for?:

      I know with a Windows 10 desktop using Bitlocker, TPM makes it possible for us to not have to enter a password to boot into Windows. I do believe Hyper-V also utilize TPM has well.

      Not using a password to unlock the TPM seems to make that situation almost, I'm saying almost, pointless.

      Agreed.

      From system owner perspective:

      Bad guy steals just hard drives, no worries. Owner safe.
      Bad guy steals entire systems, big worries. TPM is useless and Owner screwed.

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: Just for Fun - Network + Journey

      @WrCombs said in Just for Fun - Network + Journey:

      @pmoncho said in Just for Fun - Network + Journey:

      @WrCombs said in Just for Fun - Network + Journey:

      @pmoncho said in Just for Fun - Network + Journey:

      @WrCombs said in Just for Fun - Network + Journey:

      @pmoncho said in Just for Fun - Network + Journey:

      @WrCombs said in Just for Fun - Network + Journey:

      @scottalanmiller said in Just for Fun - Network + Journey:

      What is the best way to secure the most vulnerable attack vector for a network?

      Choices:

      A] Remove unneeded services running on the servers
      B] Provide end-user awareness training for office staff
      C] Update all antivirus definitions on workstations and servers
      D] Use biometrics and SSO for authentication

      Hey First Question - Thanks Scott

      My first instinct D]Use biometrics and SSO for Authentication

      The key words in the question is "most vulnerable attack vector" so IMHO, D] would incorrect.

      Well People would be the most vulnerable

      so B?

      Correct, B. @scottalanmiller will have to confirm though.

      I thought that too, but then I thought that was too easy and that he probably was meaning something else .

      I get that. There are actually many of those on the practice tests. Just when you think, "Nah, that can't be right..." Occam's razor strikes again.

      i took one of the professor messer Take ten challenges, and im not happy with the results. Guess I need to rethink how i'm studying..

      Yes. He does have some tough questions. Don't forget to check out his Pop Quiz questions as they go back a couple years. I went through most of them over the course of a couple days. If I got one wrong, I did some further research why.

      posted in Water Closet
      pmonchoP
      pmoncho
    • RE: TPM module - what is it used for?

      @scottalanmiller said in TPM module - what is it used for?:

      @pmoncho said in TPM module - what is it used for?:

      Bad guy steals just hard drives, no worries. Owner safe.

      This is a big deal as this is how most people manage to make off with data.

      Should have mentioned, if the TPM module is put to use with encryption, taking the drives is useless. The need the entire system.

      posted in IT Discussion
      pmonchoP
      pmoncho
    • RE: What Are You Watching Now

      Finished series finale of Vikings on Prime! Decent ending.

      posted in Water Closet
      pmonchoP
      pmoncho
    • 1 / 1