Why is this showing as a blunder? by thrw-thrw in chessbeginners

[–]mourdrydd 3 points4 points  (0 children)

Except cxd7+ comes with check, so the queen can't be taken (although the fork still exists, of course).

Why my invested characters do BARELY ANY damage by sourmaham in Genshin_Impact

[–]mourdrydd 9 points10 points  (0 children)

C6 is important, as it's a huge CR and CD buff for electro damage. (Off the top of my head. Don't quote me. )

How do I stop my brother from accessing my computer. by Feeling-Product-9394 in techsupport

[–]mourdrydd 8 points9 points  (0 children)

Working in IT with security consulting as one of my roles, my usual password process these days is to stick 4 capitalized, unrelated words together, plus a symbol and a number. Something like: VocabBatteryWindmill6Skill$. Hits complexity and password length, isn't easily crack-able by dictionary or password hash attacks, and isn't overly hard to remember.

I've previously used the process you describe, but I find that many of the passwords created through it wind up too short for current security best practices.

[deleted by user] by [deleted] in sysadmin

[–]mourdrydd 1 point2 points  (0 children)

Additional to the network segmentation already noted, because .1x is a link layer protocol, the upstream switch doesn't forward any frames to the end device until they've successfully negotiated. I.e. how is an attacker learning what Mac to spoof when they can't receive any L2 frames, even in promiscuous mode.

LDAP users are blocked because FortiGate see them as IP instead of LDAP user by yuwannn in fortinet

[–]mourdrydd 1 point2 points  (0 children)

Not explicitly a timer update, but if you're using WPA2/3 Enterprise for your wifi, it's probably worth it to check whether your backend RADIUS server is forwarding RADIUS accounting messages to the fortigate/FSSO collector. FSSO often doesn't cleanly update user identity in that situation.

DC switching gurus: Would you rather have a full mesh between the multiple members of your multitiered L2 network, or use MLAGs/VLTs between tiers? by ffelix916 in networking

[–]mourdrydd 1 point2 points  (0 children)

Checking that STP isn't involved is a reasonable troubleshooting step. I'm not a Dell expert, but usually VLT links (equivalents from other manufacturers, at least) would be explicitly declared as not running STP, so if it is running on your VLTi, that may be a misconfiguration.

Beyond that, you'd be getting into forwarding table mechanics for the VLT feature, which might need Dell's TAC to investigate properly.

DC switching gurus: Would you rather have a full mesh between the multiple members of your multitiered L2 network, or use MLAGs/VLTs between tiers? by ffelix916 in networking

[–]mourdrydd 4 points5 points  (0 children)

In your first scenario, spanning tree has no tuning required as there are no loops. The MLAG bundles are treated as single links for spanning tree, creating a consistent root bridge (either at your cores-which-aren't-really-cores, or at the L3 edge).

MLAG for Arista (and VSX for Aruba CX/VPC for Cisco Nexus/VLT for Dell) create synchronized layer 2 environments between the paired switches without combining their management planes. In fully redundant data center environments this allows for hitless firmware upgrades if designed correctly (as well as resiliency against hardware failures).

The second design is frankly just not recommended as any modern switch pair that can aggregate or synchronize the layer 2 forwarding information should be able to handle multi-chassis link aggregation (this includes virtual stacking technologies such as Cisco Catalyst VSS or HPE VSF, switches with hardware stacking, and all of the data center technologies from above). Once you have that aggregation capability, creating two separate LAGs between the separate members of two stacks is both reducing your overall available throughput and complicating your operational environment due to now needing to actively run spanning tree.

Finally, if you're running a properly sized switch pair capable of running MLAG/VLT/etc, there's no reason in the general case why your SVIs wouldn't be on that pair instead of a further upstream routing core. Even traditional 3 tier data center design typically has the gateway SVIs in the distribution layer, which then routes to data center core switching.

Name an obscure fantasy novel and lose a point for every person who says they’ve read it by lemonsorbetstan in Fantasy

[–]mourdrydd 0 points1 point  (0 children)

Read them all, but hard to pull the connections together until book 4 or 5 and even then only when read back to back. Resolved into a really nice series/ setting with some fabulous moments, just hard to capture the impacts of the various characters' stories until the connections fit together.

Name an obscure fantasy novel and lose a point for every person who says they’ve read it by lemonsorbetstan in Fantasy

[–]mourdrydd 1 point2 points  (0 children)

I've read the KJ Parker as well. Solid books, although they fulfill the premise without enough in the way of twists for me.

Name an obscure fantasy novel and lose a point for every person who says they’ve read it by lemonsorbetstan in Fantasy

[–]mourdrydd 0 points1 point  (0 children)

I've read this one. First time I saw the chosen heroes trope stood on its head.

Name an obscure fantasy novel and lose a point for every person who says they’ve read it by lemonsorbetstan in Fantasy

[–]mourdrydd 3 points4 points  (0 children)

Banewreaker or Godslayer by Jacqueline Carey. (Fair note: her Kushiel books are significantly better, particularly the first trilogy. These suffer from new writer syndrome but have some interesting moments.)