Jump to content

The Sorrow

Active Members
  • Posts

    289
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by The Sorrow

  1. Don't fall into "You do not praise a minor for bypassing protocols and taking matters into their own hands when it is clearly not their job nor their business" type thinking. You'll be replaced by someone more open minded and willing to do it for 10% less in the IT world. For all you know, your replacement is the kid you're trying to suppress.

    Protocol exists for a reason. Bypassing protocol is a sign of laziness. Playing by the rules and working the system to your advantage has a far greater reward than just doing whatever you want and hoping you get something beneficial out of it. The world doesn't work that way. Case and point.

  2. How about just ask the student how and thank him for bringing it to the schools attention?

    Don't screw up some kid who clearly has a liking for IT Security. If he has done nothing nefarious, you better not allow him to get ANYTHING but praise.

    Reading over things again, you clearly have no idea what happened. Therefore, you can't even be sure that something DID happen. Like I said, talk to the student, you're lucky you have the ability to contact your "hacker." Right now you're on a wild goose chase because even if you find a hole, you'll never know if it was the right one.

    I have one response, and it is a resounding NO. You do not praise a minor for bypassing protocols and taking matters into their own hands when it is clearly not their job nor their business. I would have praised him if he had went to the IT department with his findings (instead of parading the feat around and showing his teacher). Plus from what it looks like to me like no one has gotten the kid to reenact this exploit so the administrators can fix the issue.

    Ive been this kid, and i made the choice I described and was asked by the IT department to help them. Being the good kid isn't as fun when you first look at it, but it pays out much more.

  3. I need some help and direction in making a Xen cluster. What i have is three computers that i want to set up in some kind of resource sharing cluster that i can then apply Xen to so i can virtualize my current setup. Im mostly interested in the heartbeat cluster idea but i cant find anything substantial with three nodes (if heartbeat can even support three nodes). Ive also been trying to use Ubuntu Server 11.10 but thus far im seeing Red Hat is more prominent in the world of clustering and has better supporting documentation than Debian based Linux.

    That being said, open discussion.

  4. I can attest to that also, I'm holding an A average and to me it seems easy but there are others who are struggling to maintain a B average. Maybe it is because I'm trying and reading the books and using Google and YouTube on stuff I do not understand. Or maybe it is just cause I want a better job than pushing carts at Walmart, who knows.

    This is the main issue as to why people struggle. Helping adults learn when they don't want to put in a full effort is... difficult at best. Also, since ITT is a private college its made for making money, IE its a business. ITT sells on giving people chances to make career changes and a lot (most) of these people who get these ideas sold to them aren't cut out for working with computers.

  5. Ive used pfSense for a while now and feel it is the smoothest and most reliable with the easiest learning curve. Ive tried smoothwall and untangle and they're just akward for me. Advice: Try em out on VMWare. Find what you like.

  6. That is the point for your DMZ (Demilitarization Zone) and you can set NAT (Network Address Translation) to forward all your external requests to the DMZ so your LAN isn't on the internet and vulnerable to attack.

    This walkthrough helped me a lot Link

    Here's the topology of my setup too...

    http://forums.hak5.org/index.php?app=core&module=attach&section=attach&attach_rel_module=post&attach_id=672

  7. Start from the bottom (IE a PC tech) learn the ins and outs of a workstation. Hardware AND software. Then move to the next level. Network. Learn IP Addressing, Subnetting, protocols, ports etc etc etc. Ive been in the computing world for 6 years and started a little before you. I'm still learning every day. That's the only way to become anything is to play break fix and repeat.

  8. Awesome, but brutal fighting style. Check out Fight Quest - S01E10 on YouTUBE.

    Seen that Fight Quest before... And thats not half of it... I went to school at North Valley High in Grants Pass, OR. SMALL TOWN! Has to this day some of the greatest artists I've ever seen. James Platt - 8th Dan D.O.C.S. Karate and Martial Arts Hall of Famer. James Scott - 5th Dan Kajukenbo. Mike Friend - 5th Dan Kenpo Karate. Richard Andradae - 5th Dan Karate (Trained with Benny the Jet) and 7th Dan American Judo. James Platt is still one of the advisors for the school. He started a self defense class as a part of the PE system which is how i earned my belts in all these arts. Huge part of my life. Hence my reason to brand myself with my favorite art and part of the other arts as accents.

  9. Ive come across an issue actually... i plug in SFPs to either of the two sfp slots (with the switch off) and i get

    sw1-cobra.unit.net#sho int status err
    
    Port Name Status Reason
    Gi0/1 err-disabled gbic-invalid

    also

    sw1-cobra.unit.net#sh int gi 0/1 status
    
    Port Name Status Vlan Duplex Speed Type
    Gi0/1 err-disabled 1 auto auto unknown

    here is my config for the interface

    interface GigabitEthernet0/1
     switchport trunk encapsulation dot1q
     switchport mode trunk
     speed nonegotiate
     channel-group 3 mode desirable non-silent
    !
    

    may need a different GBIC? If so whats compatible with a WS-C3560-24PS...

  10. All of my tattoos mean something. "The Bird of Hermes is my name" on my left side. "Eating my wings to make me tame" on my other side. Its a script from the Ripley Scroll which a testament to self control and moderation. On my back i have the Kajukenbo crest pretty much showing my dedication to my art. On my left arm i have a chinese tiger symbolising the soft side of kung fu (a part of kajukenbo) and a dragon on my right arm symbolizing the hard side (Left being my "weak" arm and right being my "strong" arm since im right handed). Its all about symbolism. Some people dont see the reason, and others do.

×
×
  • Create New...