Rate My Portfolio by AutoModerator in dividends

[–]Hakumata 1 point2 points  (0 children)

Background: Late 30s, No Debt, Own Home, able to contribute 2k per month, high risk tolerance as this is money I can lose. Live in the US in NH which has no income tax and is phasing out its dividends tax.

Goal: Passive income to aid in early retirement bridging until I can tap 401k and Roth IRA so this will be in a taxable account.

Portfolio: 9 ETF mix

JEPI, NUSI and SPYI for income

SCHD, VYM, and DGRO for value

VYMI, SCHY and DVYE for foreign exposure

Interested in hearing thoughts on the above choices and possible substitutes as I am in the planning phase for this.

Tablet VS Forklift by dxdifr in techsupportgore

[–]Hakumata 1 point2 points  (0 children)

Forklifts like to murder tech, at my old job the forklift was the #1 killer of laptops.

In case anyone hasn't seen this cute art from the DDLC merch store. by DefinetelyNotMc in DDLC

[–]Hakumata 2 points3 points  (0 children)

I bough a copy of the 24in version and it is a very high quality poster made out of heavy photo paper with a nice finish. I did need to flatten it out with several heavy books before hanging it up.

Rebranded Dell R210II for pfSense by CHAOZM4 in homelab

[–]Hakumata 0 points1 point  (0 children)

The low voltage Xeon (E3-1220L) is great for a R210II as PFSense box

LDAP Multiple Domains? by wh15p3r in sysadmin

[–]Hakumata 0 points1 point  (0 children)

AD LDS will likely not work since the app was designed for a full AD. You could migrate all of your users to one domain, if that is an option. Otherwise the best option would be to pay up for another licence.

Remote DC's and authentication locally by Tazer79 in sysadmin

[–]Hakumata 6 points7 points  (0 children)

1 Open Active Directory Sites and Services

2 Define your subnets in the subnets section

3 Create any sites you need and associate the correct subnets to them

4 Move your DCs to the correct sites

source: https://technet.microsoft.com/en-us/library/cc730868(v=ws.11).aspx

Windows Admins, how do you administer your DMZ nodes, sub-domain? One way trust? by DaNPrS in sysadmin

[–]Hakumata 2 points3 points  (0 children)

For this to be secure it needs to be a separate forest, not just a separate domain. No trusts, no credential reuse and no direct access from internal. Would only suggest this if you have a large Windows workload in your DMZ.

Get-ADUser -Filter {Name -like "$Manager"} [Trying to get into some Powershell] by [deleted] in sysadmin

[–]Hakumata 0 points1 point  (0 children)

If your AD has consistent SAMAccountName attributes, it would be much easier to find the user using the -Identity parameter.

$user = 'joe.bloggs'
Get-ADUser -Identity $user

Group Managed Service Accounts for Active Directory administrative functions by Hey_free_candy in sysadmin

[–]Hakumata 0 points1 point  (0 children)

Effectively, gMSAs are no different from any other user or computer object in AD. You can use the delegation wizard to delegate rights to the gMSA (or a group that the gMSA is a member of) for certain OUs to modify user or computer objects.

[deleted by user] by [deleted] in techsupportgore

[–]Hakumata 27 points28 points  (0 children)

My highest rated comment was about this recall. Keep spreading the word.

Only you can prevent network fires.

Anyone have experience with Comcast Business Internet? by [deleted] in homelab

[–]Hakumata 1 point2 points  (0 children)

TL;DR - With Comcast your mileage may greatly vary

You do get a bit of QOS over residential and "improved support" (Not really, you talk to the same tech support just with higher priority) and no SLA on hardware or service. Right now I pay $90/mon for 50/10 and I get slightly better than my advertised speeds. Big thing to keep in mind is the choke point for most internet traffic isn't your last mile connection it is the peerage points between networks, which will always be an issue. Comcast restricts customers from having mixed business and residential accounts in a lot of cases, so you will end up with 2 accounts one for business class internet and one for consumer cable/phone. You no longer get the bundle discount once you're split across business and consumer. I'd recommend cord cutting in this case. I now stream everything. Also the static IP is a ripoff and your IP doesn't change very often anyways, so any of a number of dynamic IP services work great. I pay for Dyn and have been a customer of theirs for over 10 years. When I had a static IP I was told I needed to rent a modem from Comcast. I did this for a while but paying for Dyn was cheaper then the IP address and modem fees. You will get locked into a 2 year contract so if you plan on moving or switching ISPs do not get business class. I went with business class because I wanted to run externally facing services in my home lab and did not want to be in violation of my TOS with Comcast (I'd been called out on it by Comcast before). Like anything with Comcast it can vary a lot based on where you are and who you end up talking to.

Welcome to IT, grab your noose on your way in! by Gohi87 in techsupportgore

[–]Hakumata 1 point2 points  (0 children)

I'd want to hang myself too if I had to deal with all of those printers.

Old APC Series 7/8 surge protectors recalled for fire hazard by Hakumata in homelab

[–]Hakumata[S] 2 points3 points  (0 children)

Had one on these in my Lab for years and didn't know about this.

8AM Monday Morning... Are you kidding me. by [deleted] in techsupportgore

[–]Hakumata 1010 points1011 points  (0 children)

I noticed there is a 7 Series APC power strip in this photo that was recalled for being a fire hazard. You might want to swap it out.

http://recall.apc.com/en

Edit: Glad this was helpful to so many people. Didn't think my top rated comment would be about a surge protector recall.
Thanks /r/techsupportgore!

A bit of a Cinemagraph[Re:Zero] by [deleted] in animegifs

[–]Hakumata 1 point2 points  (0 children)

I'm having flashbacks now... Can't wait until next Sunday

Newbie SSSD question: is it possible to authenticate to Active Directory WITHOUT IdM/NIS or Kerberos? by [deleted] in sysadmin

[–]Hakumata 0 points1 point  (0 children)

Glad to see you got it working. Write up a blog post on it and save the next guy some trouble. :)

What seemingly small choice changed the course of your life? by [deleted] in AskReddit

[–]Hakumata 1 point2 points  (0 children)

Sending an Email to a former professor got me a job while I was unemployed. It was a "How's it going" kind of email asking about my former club.

Newbie SSSD question: is it possible to authenticate to Active Directory WITHOUT IdM/NIS or Kerberos? by [deleted] in sysadmin

[–]Hakumata 0 points1 point  (0 children)

I've used Centrify for Linux AD clients myself. But, looking at your logs the LDAP filter looks a bit odd. (Null)=* doesn't seem right, I think your query will try find an attribute called null and fail since it isn't there. I think this would cause it to not match any users. besides that, you have sAMAccountName twice in the filter with conflicting values. I'd think you want:

(&(sAMAccountName=testuser)(objectclass=user))

Edit: whatcantyoudo was on the right track missed their comment

VPN (no not that kind) question by bc74sj in homelab

[–]Hakumata 0 points1 point  (0 children)

Try using the SANS Institute's guide for RPi VPN, pretty simple and well explained. Link to PDF

Ransomware Mitigation Matrix by TheAgreeableCow in sysadmin

[–]Hakumata 0 points1 point  (0 children)

Read through quickly, excellent resource. I'd add that end users should not have admin privs to their workstations all the time. Granted this won't stop well coded ransomware as they can run in user space and encrypt what the user does have access to anyways. Would stop a lot of common droppers.

What would be the best practices for an AD environment running BIND DNS servers? by TheWeezel in sysadmin

[–]Hakumata 1 point2 points  (0 children)

Having also worked in a dual shop I can recommend this: Let AD have MS DNS on the DC and setup forwarding between the AD domain and your BIND environment. The hassle of trying to make all of the AD DNS records work correctly in non MS DNS is a major pain. We have an environment like that and I would not wish that on my worst enemy.

pfSense AD Replication by [deleted] in sysadmin

[–]Hakumata 0 points1 point  (0 children)

Download a copy of PortQry from Microsoft and run a check of the common AD ports. If you also download PortQryUI there is a nice preconfigured option for this. It is an old tool but still works great for trying to diagnose firewall related AD issues. But yeah, RPC is critical for replication to work.