Category: Nerd Babel

  • Tick Tock, More Clock Stuff

    Tick Tock, More Clock Stuff

    There are two network time protocols in use today. One is the NTP protocol, the other is PTP. I have no idea what the PTP looks like, I know that it requires hardware support. The goal of NTP is to create a local clock that is accurate to less than 1ms from sources that have…

  • It’s Late, Nerd Babble/status

    It’s Late, Nerd Babble/status

    We are in the process of moving from the image above to the image below. At least in terms of what the infrastructure looks like. Today I decommissioned an EdgeRouter 4 which features a “fanless router with a four-core, 1 GHz MIPS64 processor, 3 1Gbit RJ45 ports, and 1G SFP port.” When they say “MIPS64”…

  • What time is it?

    What time is it?

    I have hundreds of dollars worth of GPS equipment. Not counting the cell phones we all carry with us. I wanted to try to create a Stratum 0 NTP clock. The last time I attempted this, I used a Garmin handheld GPS. Time to sync was in minutes and while the power draw as trivial,…

  • The Guessing Game.  Guessing Passwords

    The Guessing Game. Guessing Passwords

    My wife read my article on passwords and “got it”. Which is nice. I was attempting to explain how password crackers use rule sets to modify input dictionaries to create more guesses from a single word list. I decided to see how much things have advanced. To say I was shocked would be an understatement.…

  • Two Factor Authentication

    Two Factor Authentication

    What we are talking about is “authentication.” Authentication is the method of confirming that you are who you say you are. There are three methods to determine authentication: Something only you know Something only you have Something unique about you In the old days, when people carried checkbooks with them and wrote checks for things,…

  • Password Security/Password Managers

    Password Security/Password Managers

    Password Security There are four ways of cracking a password. Guess the password Brute Force the password Go around the password authentication Trick the password from the owner If your password is easy to guess, then it is a weak password. Examples of weak passwords are: password, 1234, YOUR_NAME, BIRTHDAYS. Many things use a four…

  • Single Point of Failure?

    Single Point of Failure?

    Resiliency is a goal. I’m not sure if we ever actually reach it. In my configuration, I’ve decided that the loss of a single node should be tolerated. This means that any hardware failure that takes a node of line is considered to be within the redundancy tolerance of the data center. This means that…

  • What Did I Buy?

    In upgrading from copper to fiber, I’ve been exploring the different options and learning as I go. Some learning curves have been steep, others have been “relearning” what I already knew. One of the biggest things I needed to learn is that there are “switches” that are actually “routers”. That was mind-bending. The other is…

  • What Time Is It?

    What Time Is It?

    I own a pocket watch. It is beautiful, but I don’t use it very often. I know that I own a couple of watches. One of them is a battery powered solar recharging thing. My standard “watch” today is my cell phone. When I was in high school, I was very interested in accurate time…

  • How to you get there from here?

    How to you get there from here?

    The Internet is a fantastic creature. I’m not speaking of the information you can find on the internet. Nor am I speaking of the entertainment that is available on the Internet. The mere fact that you can ask for information at your desk or on your phone and somehow that request gets there, and the…