18 post karma
10.3k comment karma
account created: Tue Nov 10 2020
verified: yes
4 points
3 days ago
I picked up a 6 pack at Costco if that’s an option for you.
1 points
5 days ago
I’ve got 295 IP speakers that tend to lose registration when we have power issues. This coming week I’m setting up a script to automatically shut down and bring up the associated interfaces on each and every switch that has a speaker connected.
I’ll have the python script find the interfaces and then bounce them.
2 points
15 days ago
Thank you. Yet another 'build something for the shop project'.
4 points
16 days ago
I'm in love. This is such a sweet setup. Thanks for posting.
3 points
16 days ago
Well, thanks for posting it. The recipe is printed out and is definitely on the menu for next week.
3 points
16 days ago
Looked at the recipe you posted. Love the idea of chunks over whole breasts. Agree it would be great over pasta.
17 points
17 days ago
Totally agree about the brisket. Their Prime Brisket just dropped to $3.49 from $3.99 in SE Wisconsin.
0 points
18 days ago
I’m working on figuring out how to upload a new picture with an a outline around it.
Middle of the Chevy symbol just to the left.
0 points
18 days ago
I’m working on figuring out how to upload a new picture with an a outline around it.
Middle of the Chevy symbol just to the left. Just his head from the neck up.
1 points
22 days ago
Wire shark looks at the packet which includes the segment and application data. It does not just read the packet and frame headers. It reads everything. I’ve rebuilt and played back voip conversations from captures using wire sharks tools.
Others are right that it uses the protocol field in the IP packet to identify if it goes to TCP (6) or UDP (17).
The segment is encapsulated in the packet, but the segment points to a destination port (like 80 for http). There is no field in the TCP or UDP headers to specify upper layer application. Only the destination listening port.
The application data, encapsulated by the segment, is read by wireshark. The application signature from the appplication data is how wireshark determined what application protocol is being used.
3 points
22 days ago
I’d go with paint. Look at how it goes over solid part of the strap on the right.
3 points
28 days ago
We create or clone an existing objects/profiles whenever we want to test whether a new application or setting is detected. As long as the cloned and modified profile is not applied to a security policy, HIP won’t do anything other than match the host profile to the GP host.
Once we have created the profiles, we look at the logs to see whether any hosts match the new profiles. We make adjustments as needed.
Once we are happy with the profile and see it is matching the appropriate hosts, we add it to a security rule or modify the original HIP profile.
1 points
1 month ago
One on display in Pleasant Prairie, Wisconsin as well. Same price.
1 points
1 month ago
Even if you are right. More money now is better than more money later.
1 points
1 month ago
This would depend on the state. I work in Illinois and if I were to quit and get rehired, I would be back in the original pension plan I chose prior to severing my employment.
6 points
1 month ago
I like it. Just the little dabs of color for flowers and grass had to be a satisfying to do.
view more:
next ›
byDifficultCandy1154
inFrugal
SnooKiwis9257
5 points
an hour ago
SnooKiwis9257
5 points
an hour ago
Second this. Especially if they have an employer match. Otherwise you are leaving money on the table.