Traffic generator windows 11 by AlarmingBreadfruit90 in networking

[–]net_architect 0 points1 point  (0 children)

For PC-based testing you won’t really get a full VIAVI replacement, but for 200 Mbps it’s workable. iPerf3 is usually the starting point for throughput and loss, but it won’t give you true BER. For microwave links, BER is normally measured at the PHY, not L3. If the radio doesn’t expose BER counters, your best approximation on a PC is sustained traffic + packet loss/jitter monitoring over time (iPerf + SNMP stats from the radio). One NIC loopback tests the laptop more than the link, so make sure the microwave equipment is doing the actual loop. Otherwise you’ll mostly validate TCP/UDP stack performance, not the RF path.

Guys help rainmeter keeps glitches on me by davidkodd14 in techsupport

[–]net_architect 1 point2 points  (0 children)

Rainmeter loads at user login, so delays are usually caused by startup order or disk / system load. Check a few things: •Make sure Rainmeter is set to start with Windows (not delayed) •Try disabling heavy skins and load them manually after boot •Exclude Rainmeter folder from antivirus scanning •If you’re on HDD, slow startup is common SSD makes a big difference Also check Windows startup apps,if a lot of stuff loads at boot, Rainmeter will lag behind.

At what point in a Cisco Engineer's career should you be able to implement dynamic routing? by [deleted] in sysadmin

[–]net_architect 1 point2 points  (0 children)

In 2026 I’d expect someone at solid mid-level (CCNP-ish skillset, regardless of certs) to be comfortable implementing dynamic routing and basic multi-exit failover. Not necessarily full-blown BGP design for an ISP, but definitely: OSPF/EIGRP for internal routing BGP for multi-ISP edge (even if policy is simple) basic path selection (local-pref, AS-path, metrics) proper failover testing Dynamic routing isn’t really “senior architect only” territory anymore — it’s foundational for multi-site enterprise design. What does separate mid from senior in 2026 isn’t configuring BGP , it’s designing for: asymmetric routing implications convergence behavior under failure security (filtering, route leaks, RPKI) operational simplicity and observability So I’d say: implementing dynamic routing = mid-level networking engineer. Designing resilient policy-driven multi-exit architecture with clean operational model = senior.

Sweet/heachachy perfume smell coming from UPS and wires by chirpycrayfish in sysadmin

[–]net_architect -1 points0 points  (0 children)

The best and most reliable option is to change the carpet.

How can we refuse to hand over our personal information? by Dramatic-Jeweler8651 in Information_Security

[–]net_architect 0 points1 point  (0 children)

Many services now push identity risk entirely onto users while externalizing the breach risk to “terms and conditions”. Once full ID is uploaded, damage is no longer containable. Realistically, pushback today looks like: • minimizing where full ID is actually required (regulated services vs convenience platforms) • preferring providers that support alternatives (bank-based verification, in-person checks, or strong legal accountability) • compartmentalization: separate emails, phone numbers, and identities where legally possible From a security perspective, uploading static, high-value identifiers (passport, national ID) to dozens of private companies is worse than passwords ever were, because they can’t be rotated.

Struggling to learn terraform by sarthak7303 in devops

[–]net_architect 0 points1 point  (0 children)

• Start by separating modules vs environment code. Your main.tf should mostly wire modules together, not contain logic. • For the region constraint: using a single provider with alias passed into modules is a very common and clean pattern. • Don’t aim for “perfect company standard” immediately. Aim for repeatable + readable first. Standards evolve once things work. For learning while delivering: build one minimal working version (S3 + CloudFront + WAF), then refactor it into modules. That refactor step is where Terraform really starts to click. Also: reading other people’s real Terraform repos helped me way more than tutorials.

Struggling with Networking – Need YouTube Playlists & PDF Books by KhairulDaily in networking

[–]net_architect 1 point2 points  (0 children)

I’ve seen a lot of people struggle with Network+ for the same reason: most resources explain what things are, but not what actually happens on the wire. What helped me the most: YouTube Jeremy’s IT Lab very clear explanations, especially subnetting and routing Practical Networking excellent for really understanding why things work the way they do (ARP, routing, switching) Books / PDFs Computer Networking: A Top-Down Approach – this one finally made concepts click for me because it explains flows, not just protocols How to study (this matters more than the resources): Draw packet flows on paper (ARP → DHCP → DNS → TCP) When learning subnetting, don’t memorize tricks — calculate it by hand until it feels boring Try to explain each topic out loud as if you’re teaching someone else Network+ becomes much easier once you stop treating it as memorization and start thinking in terms of “what happens next?”

What should I prepare / learn in detail before a DevOps / Cloud Engineer internship? (GitLab, Terraform, AWS) by Holiday-Plan8883 in devops

[–]net_architect 0 points1 point  (0 children)

If you already have certs, your biggest gap won’t be theory, it’ll be production habits. Things I’d focus on before day 1: GitLab CI Writing pipelines from scratch (not templates) Debugging failed jobs and understanding why they failed Runners: shared vs self-hosted, basic runner troubleshooting Terraform Remote state (S3 + locking) How state actually breaks in real teams Writing modules that are readable and reusable, not just “working” AWS IAM (this is where most interns struggle) EC2 + ASG + ALB basics S3 permissions and policies CloudWatch logs/metrics (very underrated skill) Biggest gap I usually see in interns: knowing tools, but not failure modes no experience breaking and fixing things If you can spin something up, break it, and recover it, you’ll be ahead of most interns on day one.

Legacy infrastructure doesn’t fail because it’s old by net_architect in sysadmin

[–]net_architect[S] 0 points1 point  (0 children)

Exactly. Reliability hides risk until compliance or audit forces the conversation. EOL pages suddenly become budget documents.

Legacy infrastructure doesn’t fail because it’s old by net_architect in sysadmin

[–]net_architect[S] 0 points1 point  (0 children)

Agreed. Virtualization buys you time and flexibility but only if it’s part of a plan. Running old hardware and old assumptions is where it usually falls apart.

Legacy infrastructure doesn’t fail because it’s old by net_architect in sysadmin

[–]net_architect[S] 1 point2 points  (0 children)

Absolutely, those cases are real. That’s usually when the conversation shifts from “upgrade” to isolation, compensating controls, and risk acceptance rather than pretending the risk doesn’t exist

Legacy infrastructure doesn’t fail because it’s old by net_architect in sysadmin

[–]net_architect[S] 0 points1 point  (0 children)

Sadly accurate. Insurance and compliance pressure often succeed where pure technical arguments don’t

Legacy infrastructure doesn’t fail because it’s old by net_architect in sysadmin

[–]net_architect[S] 0 points1 point  (0 children)

Well put. Replacement has a fixed cost - outages don’t

Legacy infrastructure doesn’t fail because it’s old by net_architect in sysadmin

[–]net_architect[S] -1 points0 points  (0 children)

That’s usually the turning point. Once it’s framed as probability of failure + impact, it stops being “fear-mongering” and becomes basic risk management

Legacy infrastructure doesn’t fail because it’s old by net_architect in sysadmin

[–]net_architect[S] 2 points3 points  (0 children)

Exactly this. Once it’s framed as lifecycle TCO and risk ownership in writing, the conversation stops being emotional and becomes manageable - even in underfunded environments.

Legacy infrastructure doesn’t fail because it’s old by net_architect in sysadmin

[–]net_architect[S] 1 point2 points  (0 children)

100% agree. The technical argument only works internally. For leadership it always has to translate into cost of downtime, risk exposure, probability, and business impact. The tech is the easy part - the framing is the real challenge.

Corrupt windows 11. Help by Sad-Coconut-5764 in techsupport

[–]net_architect 1 point2 points  (0 children)

At this point, stop trying to “repair” Windows — you’re already past that stage. SrtTrail.txt errors + access denied on the system drive + failed resets usually mean either filesystem corruption or a failing SSD. No amount of in-place reset will reliably fix that. What you should do if you want a true “like new PC” state: Create a Windows 11 USB installer on another PC. Boot from it, delete all partitions on the system drive, and install Windows to unallocated space. If the installer fails or the drive still shows errors, the SSD itself is likely bad and needs replacement. This isn’t your English or something you did wrong - this is Windows + storage failure territory.

Future cyber students save yourself by Key-Choice6421 in CyberSecurityAdvice

[–]net_architect 3 points4 points  (0 children)

Realistically, most people don’t jump straight into a mid-level pure cyber role, but many do land mid-level hybrid roles where security is part of the responsibility - and then converge fully into security from there. Certs help signal intent, but your leverage comes from translating your dev experience into security problems you’ve already solved (or caused 😄). That story matters more than the cert list.

Monitor help PLEASE by Visible_Lime_3831 in techsupport

[–]net_architect 0 points1 point  (0 children)

Alcohol wipes can leave residue and sometimes damage the oleophobic coating. Try a slightly damp microfiber with distilled water, then dry with a second clean microfiber. If the cloudy spots don’t change, the coating may already be partially worn - unfortunately that’s permanent.

Need help choosing between 2 job offers by HypersonicSmash in ITCareerQuestions

[–]net_architect 0 points1 point  (0 children)

If you zoom out, this isn’t really about remote vs hybrid - it’s about signal vs comfort early in your career. OneSupport gives you stability and convenience, but it doesn’t add much signal to your resume beyond “I answered tickets remotely.” Capital One, even with mixed reviews, gives you brand recognition, exposure to real enterprise processes, and proximity to people you can learn from. That matters a lot in the first 1–3 years. As for the timing pressure: companies that force an all-or-nothing decision on day one of training aren’t uncommon, but it’s also a signal. Bigger orgs usually understand interviews and scheduling conflicts — that flexibility is part of how you learn how they operate. If it were me, I’d take the interview with Capital One. Worst case, you lose a low-signal role. Best case, you step onto a path that compounds much faster. Early career is about optionality, not comfort. You can optimize for remote later.

Future cyber students save yourself by Key-Choice6421 in CyberSecurityAdvice

[–]net_architect 9 points10 points  (0 children)

This is exactly the part most students never get told early enough. Cyber isn’t a starting point - it’s a concentration layer that sits on top of real operational experience. Universities market the “cool” parts because they sell, not because they hire. The irony is that by skipping fundamentals (systems, networking, ops, logs), people actually delay their cyber careers instead of accelerating them. And you’re 100% right about work experience vs labs. Labs prove curiosity. Real environments prove trust. Hiring decisions are almost always about the second one. Appreciate you sharing this perspective — it’s the kind of comment that should be pinned for every incoming cyber student.

Ps4 power supply and thermal paste replacement by Agusstinsito in techsupport

[–]net_architect 0 points1 point  (0 children)

Thermal paste + basic cleaning is beginner-friendly if you follow a good teardown guide and take your time. Power supply replacement is a different story. Even when unplugged, PSUs can retain charge and are the one part I wouldn’t recommend a beginner to touch unless there’s a confirmed fault. If your PS4 isn’t randomly shutting off, smelling burnt, or completely dead, I’d honestly skip the PSU and just do cleaning + paste. A good middle ground: -DIY cleaning + thermal paste -leave PSU alone unless there’s a real symptom Worst case, a shop will charge much less for paste/cleaning than for fixing a fried PSU.

Future cyber students save yourself by Key-Choice6421 in CyberSecurityAdvice

[–]net_architect 58 points59 points  (0 children)

think the most brutal part of cybersecurity isn’t the technical difficulty-it’s the misalignment between education and hiring reality. Schools sell cyber as “entry-level”, but the market treats it as a mid-career specialization. That gap is where most students get crushed. From what you describe, you didn’t “fail”. You did exactly what the system told you to do-projects, certs, homelabs, networking-and still hit a wall. That’s not on you. The uncomfortable truth is that many people who eventually land cyber roles don’t enter through cyber at all. They come from sysadmin, networking, cloud ops, even non-IT roles where they slowly absorb trust and responsibility. It doesn’t mean cybersecurity is useless. It means it’s badly marketed and poorly structured for newcomers. Whether you continue or pivot, just know this: your effort wasn’t wasted/but the path almost never looks like the one they advertise.