Podcasts about dhcp

Principal protocol used to assign IPv4 addresses on an IPv4 network

  • 148PODCASTS
  • 275EPISODES
  • 40mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Mar 18, 2026LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about dhcp

Latest podcast episodes about dhcp

Oh Fork It
Muchachos, Ya Va, Me Está Imprimiendo la Impresora

Oh Fork It

Play Episode Listen Later Mar 18, 2026 106:59


Episodio 361.El Ascensor en Fibonacci con los alambritos en sus plastiquitos tiene plástico pa tirar pal techo, mide 27 pulgadas de frente y 27 pulgadas verticales. En 12 por ciento suena durísimo y tiene una pared de kanjis que dice DHCP y nos vamos. ¿La disposición de la basura? Déjala unos días que se madure.

Desde el reloj
Mi switch PoE Mikrotik CRS112-8P-4S-IN

Desde el reloj

Play Episode Listen Later Mar 10, 2026 14:09


Hace unos meses cambié en casa el switch principal, ya sabes, ese que permite que todo siga funcionando aunque me quede sin Internet, el router se apague o la ONT decida morir. También es quién reparte el DHCP en mi red y, ahora, el que reparte alimentación PoE a varios elementos de casa. Te cuento el cambio y lo que puede estar por venir.

David Bombal
#554: WHY Your Cheap Chinese IoT Camera Is A Network NIGHTMARE

David Bombal

Play Episode Listen Later Mar 10, 2026 42:28


Are your smart home devices spying on you? In this video, David Bombal interviews cybersecurity researcher and IoT penetration tester, Matt Brown, to reveal how to intercept and decrypt supposedly secure SSL/TLS traffic from IoT devices. Matt demonstrates his open-source tool, "Man in the Middle Router," a specialized Linux-based bash script designed to simplify IoT hardware hacking labs. This tool stitches together essential Linux utilities—including HostAPD (for access points), DNSmasq (for DHCP), and iptables (for traffic routing)—to transform any Linux computer or Raspberry Pi into a transparent intercepting router. In this technical deep-dive, you will learn: How a Man in the Middle (MITM) attack intercepts encrypted TLS (HTTPS) communications. How to set up an IoT penetration testing lab using minimal hardware, such as an Alpha Wi-Fi adapter and an Ethernet dongle. The difference between theoretical attacks and real-world vulnerabilities like the failure of IoT devices to validate server certificates. Transparent proxy setup using tools like mitmproxy to visualize raw API data. Live Hacking Demonstration Matt moves beyond theory to demonstrate a live hack of an Anran Wi-Fi security camera purchased from eBay. He shows the exact process of capturing and decrypting the camera's API traffic (apis.us-west.cloudedge360.com). This demonstration exposes that the device is transmitting sensitive information—including authentication credentials—in cleartext over HTTP inside the broken TLS tunnel. Whether you are a network engineer, network security analyst, or a hardware hacking enthusiast, this video provides a step-by-step framework for auditing the security and privacy of the devices on your network. // Matt Brown's SOCIAL // X: https://x.com/nmatt0 YouTube: / @mattbrwn LinkedIn: / mattbrwn GitHub: https://github.com/nmatt0 Reddit: https://github.com/nmatt0 Website (with training courses): https://training.brownfinesecurity.com/ // GitHub REFERENCE // mitmrouter: https://github.com/nmatt0/mitmrouter // Camera REFERECE // https://www.amazon.com/ANRAN-Security... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:33 - Introduction 02:33 - Matt's Solution for IoT Devices 05:38 - Getting around SSL Pining / Certificate Validation 08:55 - Demo - The Basics 12:00 - Demo - Man In The Middle Router Tool 15:00 - Demo - Software/Hardware Considerations 20:12 - Demo - MITM Proxy 24:43 - Demo - MITM Router 33:58 - Example Using a Real IoT Device 36:33 - David's Questions 37:50 - More About Matt Brown 38:41 - Android Vs Apple 40:33 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #iot #hacking #iothacking

David Bombal
#548: Stop Troubleshooting Manually. Meet Your Digital TEAMMATE

David Bombal

Play Episode Listen Later Feb 20, 2026 16:58


Big thanks to ‪@Cisco‬ for sponsoring this video and sponsoring my trip to Cisco Live Amsterdam. Will AI replace network engineers in 2026? In this video, I sit down with Joe Vaccaro (VP/GM of Cisco ThousandEyes) to reveal the truth about "Agentic Ops" and how it differs from traditional AIOps. We dive deep into the new "Digital Teammate" concept within ThousandEyes and demo exactly how AI agents can autonomously troubleshoot complex network outages (like DHCP and DNS failures) in seconds. Instead of taking your job, Joe explains how these agents act as a force multiplier for your career—handling the tedious "mean time to innocence" tasks so you can focus on architecture. If you are worried about the future of the CLI or manual troubleshooting, you need to see this demo. Key Topics Covered: • Cisco Agentic Ops Explained: Joe Vaccaro breaks down the shift to autonomous reasoning. • ThousandEyes Demo: Watch an AI agent diagnose a DHCP failure and suggest the exact fix (subnet expansion). • Views Explainability: How to troubleshoot "unknown paths" and ISP outages (like AWS/Azure) automatically. • Career Survival Guide: Why Cisco believes AI will train the next generation of CCIE-level engineers, not replace them. //Joe Vaccaro's SOCIAL // Cisco Blogs: https://blogs.cisco.com/author/vaccaroj LinkedIn: / joevaccaro X: https://x.com/joevaccaro X: https://x.com/thousandeyes Website: https://www.thousandeyes.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:42 - Troubleshooting 02:00 - ThousandEyes Updates 03:52 - Demo 1 06:50 - Agentic Steps on a network 07:26 - Demo 2 10:50 - ThousandEyes Outages Page 11:34 - Agents in ThousandEyes 13:49 - New Demands by AI 14:14 - Will AI Replace Network Engineers ? 15:15 - Will The Agents Need a Human in the loop? 16:10 - Will This become More Autonomous ? 16:48 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #ciscolive #ciscoemea

Technology Tap
Understanding DHCP: Who Am I On This Network? | CompTIA Study Guide

Technology Tap

Play Episode Listen Later Feb 16, 2026 29:39 Transcription Available


professorjrod@gmail.comThis episode of Technology Tap: CompTIA Study Guide dives into the essential networking concept of DHCP and the critical question every device asks on a network: 'Who am I?' Understanding DHCP is key for IT skills development, helping you assign IP addresses, manage subnet masks, and configure DNS settings efficiently. Whether you're preparing for your CompTIA exam or enhancing your technology education, this tech exam prep episode breaks down complex networking components into clear, digestible explanations. Join us as we explore how devices establish their identity on networks and troubleshoot connectivity challenges effectively.We map the full DORA exchange and explain what each step means on the wire. Then we take on the headaches: APIPA addresses that scream “no server answered,” scopes that quietly run dry, and VLANs where broadcasts stop at the router. You'll learn how to architect a central DHCP service with relay agents across subnets, tune lease durations for guests versus office gear, and avoid conflicts with smart exclusions. Real-world stories reveal how a rogue consumer router can hijack traffic, and we share practical defenses using DHCP snooping, trusted ports, and better inventory to shut down shadow IT before it bites.Certification seekers get a rapid-fire quiz that cements the essentials: spotting 169.254.x.x, defining a scope, choosing the correct gateway role, and using DHCP snooping to stop unauthorized offers. We also connect the dots to the cloud: how virtual machines, VPCs, and Kubernetes pods receive identities dynamically so services discover each other and policies hold. Throughout, we keep it hands-on with ipconfig tips, quick checks to confirm routing and DNS, and a simple mental model for leases that makes troubleshooting second nature.If this helped you think like a technician, tap follow, share it with a teammate who lives in ipconfig, and leave a quick review so more learners can find us. Got a DHCP war story or a tip that saves minutes under pressure? Drop it in the comments and let's compare notes.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
Windows Troubleshooting Starts With Networking | CompTIA A+ Exam Prep Tips

Technology Tap

Play Episode Listen Later Feb 4, 2026 26:39 Transcription Available


professorjrod@gmail.comAre you preparing for the CompTIA exam or looking to boost your IT skills development? This episode dives deep into Windows troubleshooting with a focus on network diagnostics — a crucial topic for any tech exam prep. We guide you through validating a Windows machine's network identity using IPConfig, performing a strict ping sequence to verify communication scope, and utilizing NSLookup to troubleshoot DNS issues. Following this disciplined order ensures clarity and efficiency, making every fix both defensible and effective. Whether you're studying solo or in a study group, this step-by-step approach to Windows networking will enhance your technology education and help you succeed in your IT certification journey.We dig into why a 169.254 APIPA address narrows the culprit to DHCP or network infrastructure, not the NIC or OS. Then we connect the dots between ports and services using Netstat, making it clear when a service is misconfigured rather than the network being “down.” From web ports 80 and 443 to SMB 445 and RDP 3389, you'll see how listening states reveal the true problem fast.Powerful remote access demands restraint. We break down when RDP makes sense, why Network Level Authentication should be non-negotiable, and how consent-based Remote Assist reduces risk when users need to stay in control. For scale, we highlight WinRM over HTTPS and SSH as secure, script-friendly options that keep credentials protected and GUIs out of the attack surface.Performance complaints need evidence, not guesswork. We show how Task Manager, Resource Monitor, Performance Monitor, and Event Viewer combine to reveal bottlenecks, crashes, and policy blocks. When things get critical—no boot, blue screens—we map BIOS vs UEFI realities, then use WinRE tools in the safest order to recover without data loss. By the end, you'll have a repeatable framework: identity, routing, names, services, performance, platform, recovery. Subscribe, share with a teammate who still starts with the browser, and tell us: what's your first command when “nothing works”?Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
Windows Troubleshooting Strategies for IT Certification Success

Technology Tap

Play Episode Listen Later Jan 12, 2026 27:20 Transcription Available


professorjrod@gmail.comWindows troubleshooting can feel like guesswork, especially when preparing for your CompTIA exam. In this episode, we delve into the inner workings of the Windows OS and introduce a practical decision flow that reduces guesswork and strengthens your tech exam prep. Learn how to transform vague issues into precise, testable hypotheses, leading to fewer reinstalls and more reliable fixes. This approach not only builds your IT skills development but also prepares you for real-world challenges in technology education. Perfect for anyone studying for IT certifications or looking to sharpen their troubleshooting techniques, join us as we uncover strategies to succeed in your CompTIA study guide journey.We dig into Device Manager as a live negotiation table between hardware and the OS, showing why disabling a suspect device is a powerful experiment that reduces variables and confirms root cause. Storage gets the same rigor: Disk Management looks simple but enforces geometry, not wishes, and we explain why GPT vs MBR matters less than understanding adjacent unallocated space and the risks of rushing. When precision matters most, DiskPart demands intent and verification at every step—list, select, confirm, proceed—because there's no undo.Permissions emerge as the hidden culprit behind many “bugs.” With Whoami, group membership, and elevation in focus, identity becomes observable and solvable. On the network side, we replace “is it down?” with “how far does connectivity go?”—a layered method that isolates DNS failures when local resources work but websites won't resolve. We make the case for DHCP to reduce human error, and for treating the firewall as evidence, not an obstacle, by aligning apps, ports, and profiles instead of flipping switches.Throughout, the command line earns trust not for nostalgia, but for honesty. SFC validates OS integrity so you can stop blaming the kernel, while CHKDSK corrects map-to-disk mismatches before you condemn hardware. We close with a repeatable walkthrough: observe first, read Task Manager patterns, validate hardware and identity, test network boundaries, then change one variable at a time. If this approach helps you think clearer and fix faster, subscribe, share with a teammate, and leave a review to help others troubleshoot with confidence.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
Printers, Decoded: Understanding Printer Technology for IT Professionals Chapter 10

Technology Tap

Play Episode Listen Later Dec 9, 2025 32:13 Transcription Available


professorjrod@gmail.comPrinters and multifunction devices are more than just simple office tools—they're intricate systems combining optical, thermal, mechanical, and networked computing components. In this episode, we decode printer technology and its critical role in business operations, highlighting how these devices impact IT skills development and technology education. From unboxing to output, we explore the key decisions that keep your pages moving smoothly while safeguarding your data. Whether you're preparing for CompTIA exams or seeking practical IT certification tips, this episode offers valuable insights into managing printer technology within your IT infrastructure.Instructional Downloadable Resource Guidehttps://www.professorjrod.com/downloadsWe start with fit-for-purpose buying—matching speed, DPI, trays, duplexing, and duty cycle to real workloads—then move to placement and environment, where airflow, humidity, and power quality determine whether a fleet runs smoothly or jams at 4:58 p.m. Firmware strategy matters more than most shops admit: back up configs, schedule updates, and never interrupt a flash. On connectivity, we compare USB simplicity against Ethernet and Wi‑Fi flexibility, then layer in drivers and PDLs—PCL for speed, PostScript for precision, XPS for Windows pipelines—plus the color logic of CMYK. You'll hear clean exam clues for the A+ and practical tells for real-world triage, like when a single user's issue is just a preference and not a driver.Inside the box, we translate the seven-step laser process into actionable troubleshooting: charging, exposing, developing, transferring, fusing, and cleaning each leave fingerprints—smears, ghosting, or blank pages—that point straight to the failing part. We round out the print tech tour with inkjet (thermal vs piezo), thermal printers (direct vs transfer), and impact units for multipart forms. Then we head to the network, where DHCP reassignments, wrong ports, and spooler crashes derail entire floors. Print servers centralize power and risk, and mobile/cloud printing adds discovery quirks and new attack surfaces.Security is the blind spot: printers hold disks, address books, and cached jobs. We lay out the must-haves—PIN or badge release, secure erase, firmware signing, role-based access, and segmentation—so confidential pages don't land in the wrong tray and default passwords don't become open doors. We finish with ethics, because technicians handle sensitive data and trust is the real SLA. If you want sharper troubleshooting, stronger security, and higher A+ exam confidence, this one's a field guide you'll use tomorrow.Enjoyed the deep dive? Follow @ProfessorJRod, share this episode with your IT team, and leave a review so more techs can find it.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

InfosecTrain
Top Network Sniffing Techniques Every Ethical Hacker Must Know

InfosecTrain

Play Episode Listen Later Nov 22, 2025 3:37


Network sniffing is a crucial skill in cybersecurity, helping professionals analyze network traffic, uncover vulnerabilities, and identify malicious activity. In this episode, we explore the most effective sniffing techniques used in penetration testing—from packet capture and ARP spoofing to Wi-Fi sniffing and SSL stripping—and explain how they work in real-world scenarios.

Technology Tap
DHCP Demystified

Technology Tap

Play Episode Listen Later Nov 4, 2025 29:03 Transcription Available


professorjrod@gmail.comEver wonder how your phone grabs an IP address the instant you join Wi‑Fi? We break down the invisible handshake that makes it happen: DORA. From discovery to acknowledgement, we map each step of the DHCP exchange, explain lease timers, and show how networks hand out addresses at scale without stepping on their own toes. Along the way, we share practical stories from classrooms, offices, and coffee shops that turn abstract packets into clear mental models.We go deeper than definitions. You'll learn how scopes shape address pools, why reservations keep printers stable, and how APIPA exposes broken paths with 169.254.x.x clues. In segmented environments, relays and the GIADDR field become the traffic cops that steer requests to the right subnet; misconfigure them and clients get stranded. Security gets real too: rogue DHCP can poison DNS, starvation floods can exhaust pools, and well‑meaning mesh gear can become a second server. We detail protective moves like DHCP snooping, port security, and rate limiting, plus how snooping's binding tables feed stronger Layer 2 defenses.Resilience matters, so we unpack failover strategies—hot standby, load balancing, and legacy split scopes—and the rich set of DHCP options that deliver DNS, NTP, TFTP, and VoIP boot settings. We also tackle IPv6 with a sober lens: where SLAAC fits, when DHCPv6 is still essential, and why economics slow change even as IPv4 addresses remain scarce. If you support users, we hand you a troubleshooting playbook: spot APIPA, check relays, expand scopes, and use ipconfig release/renew to solve issues methodically and ace help desk interviews.If this helped you see the network with new eyes, tap follow, share with a teammate, and leave a quick review. Got a DHCP puzzle or a rogue gear story? Send it our way and we might feature it next time.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Oracle University Podcast
Inside Cloud Networking

Oracle University Podcast

Play Episode Listen Later Nov 4, 2025 19:15


In this episode, hosts Lois Houston and Nikita Abraham team up with Senior Principal OCI Instructor Sergio Castro to unpack the basics of cloud networking and the Domain Name System (DNS). You'll learn how local and virtual networks connect devices, and how DNS seamlessly translates familiar names like oracle.com into addresses computers understand.   Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu   Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------------ Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hi everyone! For the last few weeks, we've been talking about different aspects of cloud data centers. Today, we're focusing on something that's absolutely key to how everything works in the cloud: networking and domain name systems.  00:52 Lois: And to guide us through it, we've got Sergio Castro, Senior Principal OCI Instructor at Oracle University. We'll start by trying to understand why networking is so crucial and how it connects everything behind the scenes. Sergio, could you explain what networking means in simple terms, especially for folks new to cloud tech? Sergio: Networking is the backbone of cloud computing. It is a fundamental service because it provides the infrastructure for connecting users, applications, and resources within a cloud environment. It basically enables data transfers. It facilitates remote access. And ensures that cloud services are accessible to users. This provided that these users have the correct credentials.  01:38 Nikita: Ok, can you walk us through how a typical network operates? Sergio: In networking, typically starts with the local area network. Basically, networking is a crucial component for any IT service because it's the foundation for the architecture framework of any of the services that we consume today. So, a network is two or more computers interconnected to each other. And not necessarily it needs to be a computer. It can be another device such as a printer or an IP TV or an IP phone or an IP camera. Many devices can be part of a local area network. And a local area network can be very small. Like I mentioned before, two or more computers, or it could grow into a very robust and complicated set of interconnected networks. And if that happens, then it can become very expensive as well. Cloud networking, it's the Achilles heel for many of the database administrators, programmers, quality assurance engineers, any IT other than a network administrator. Actually, when the network starts to grow, managing access and permissions and implementing robust security measures, this coupled with the critical importance of reliable, and secure performance, can create significant hurdles. 03:09 Nikita: What are the different types of networks we have? Sergio: A local area network is basically in one building. It covers… it can be maybe two buildings that are in close proximity in a small campus, but typically it's very small by definition, and they're all interconnected to each other via one router, typically. A metropolitan area network is a typical network that spans into a city or a metro area, hence the name metropolitan area network. So, one building can be on one edge of the city and the other building can be at the other edge of the city, and they are interconnected by a digital circuit typically. So that's the case. It's more than one building, and the separation of those buildings is considerable. It can go into several miles.  And a wide area network is a network that spans multiple cities, states, countries, even international. 04:10 Lois: I think we'll focus on the local area network for today's conversation. Could you give us a real-world example, maybe what a home office network setup looks like? Sergio: If you are accessing this session from your home office or from your office or corporate office even, but a home office or a home network, typically, you have a router that is being provided to you by the internet vendor—the internet service provider. And then you have your laptop or your computer, your PC connected to that router. And then you might have other devices either connected via cable—ethernet cable—or Wi-Fi. And the interconnectivity within that small building is what makes a local area network. And it looks very similar once you move on into a corporate office. Again, it's two or more computers interconnected. That's what makes a local area network. In a corporate office, the difference with a home office or your home is that you have many more computers. And because you have many more computers, that local area network might be divided into subnets. And for that, you need a switch. So, you have additional devices like a switch and a firewall and the router. And then you might have a server as well. So that's the local area network. Two or more computers. And local area networks are capable of high speeds because they are in close proximity to each other.  05:47 Nikita: Ok… so obviously a local area network has several different components. Let's break them down. What's a client, what's a server, and how do they interact? Sergio: A client basically is a requester of a service. Like when you hop into your browser and then you want to go to a website, for example, oracle.com, you type www.oracle.com, you are requesting a service from a server. And that server typically resides in a data center like oracle.com under the Oracle domain is a big data center with many interconnected servers. Interconnected so they can concurrently serve multiple millions of requests coming into www.oracle.com at the same time. So, servers provide services to client computers. So basically, that's the relation. A client requests a service and the server provides that service.  06:50 Lois: And what does that client-server setup actually look like? Sergio: So, let's continue with our example of a web browser requesting a service from a web server. So, in this case, the physical computer is the server. And then it has a software running on it. And that makes it a web server. So, once you type www.oracle.com, it sends the request and the request is received. And provided that everything's configured correctly and that there are no typos, then it will provide a response and basically give the view of the website. And that's obviously in the local area network, maybe quality assurance when they were testing this for going live. But when it goes live, then you have the internet in the middle. And the internet in the middle then have many routers, hubs, switches. 07:51 Transform the way you work with Oracle Database 23ai! This cutting-edge technology brings the power of AI directly to your data, making it easier to build powerful applications and manage critical workloads. Want to learn more about Database 23ai? Visit mylearn.oracle.com to pick from our range of courses and enroll today!   08:16 Nikita: Welcome back! Sergio, would this client-server model also apply to my devices at home? Sergio: In your own local area network, you have client server even without noticing. For example, let's go back to our home office example. What happens if we add another laptop into the scenario? Then all of these devices, they need a way for them to communicate. And for that, they have an IP address. And who provides that IP address? The minute that you add, the other device is going to send a request to the router. The router, we call it router, but it has multiple functions like the mobile device, the handheld device that we call smartphone. It has many functions like camera and calendar and many other functionalities. The router has an additional functionality called the dynamic host configuration protocol at DHCP server. So basically, the laptop requests, hey, give me an IP address, and then the router or the DHCP server replies, here's your IP address. And it's going to be a different one. So, they don't overlap. So that's an example of client server. 09:32 Lois: And where do virtual networks fit into all this?  Sergio: A virtual network is basically, a software version of the physical network. It looks and feels exactly as a physical network does. We do have a path or a communication, in this case, in the physical network, you have either Wi-Fi or you have internet cable. And then you add your workstations or devices on top of that. And then you might create subnets.  So, in a software-defined network or in a virtual network, you have a software-defined connectivity, physical cable and all of that. Everything is software-defined. And it looks exactly the same, except that everything is software. In a software or a virtual network, you can communicate with a physical network as if that software or that virtual network was another physical network. Again, this is a software network or a software-defined network, a virtual network, no longer a physical network.  10:42 Lois: Let's switch gears a little and talk about Domain Name Systems. Sergio, can you explain what DNS is, and why it's important when we browse the web? Sergio: DNS is the global database for internet addressing. The DNS plays a very important role on the internet. And many internet services are closely related to DNS. The main functionality of DNS is to translate easy-to-remember names into IP addresses. Some IP addresses might be very easy to remember. But however, if you have many of them, then it's easier to remember oracle.com or ucla.edu or navy.mil for military or eds.org for organization or gobierno.mx for Mexico. So that's the main feature of the DNS. It's very similar to a mobile phone to the contacts application in your mobile phone, because the contacts application maps names to phone numbers. It's easier to remember Bob's phone than 555-123-4567. So, it's easier to remember the name of the persons in your contacts list, like it is easier to remember, as previously mentioned, oracle.com than 138.1.33.162. Again, 138.1.33.162 might be easy for you to remember if that's the only one that you need to remember. But if you have 20, 40, 50, like we do with phone numbers, it's easier to remember oracle.com or ucla.edu. And this is essential, this mapping, again, because we work with names it's easier for us to remember. However, the fact is that computers, they still need to use IP addresses. And remember that this is the decimal representation of the binary number. It's a lot harder for us to remember the 32 bits or each one of the octets in binary. So that's the main purpose of DNS. Now the big difference is that the contact list in a cell phone is unique to that individual phone. However, DNS is global. It applies to everybody in the world. Anybody typing oracle.com will translate that into 138.1.33.162. Now this is an actual IP address of oracle.com. Oracle.com has many IP addresses. If you ping oracle.com, chances are that this is one of the many addresses that maps to oracle.com. 13:35 Nikita: You mentioned that a domain name like oracle.com can have many IP addresses. So how does DNS help my computer find the right one? Sergio: So, let's say that you want to look for www.example.com, how do you do that? So, you type in your computer instance or in your terminal, in your laptop, in your computer, you type in your browser "www.example.com." If the browser doesn't have that information in cache, then it's going to first ask your DNS server, the one that you have assigned and indicating in your browser's configuration. And if the DNS server then it will relate that the information is 96.7.128.198. This address is real, and your browser will go to this address once you type www.example.com. 14:34 Nikita: But what happens if the browser doesn't know the address?  Sergio: This is where it gets interesting. Your browser wants to go to www.example.com. And it's going to go and look within its cache. If it doesn't have it, then the first step is to go ahead to your DNS server and ask them, hey, if you don't know this address, go ahead and find out. So, it goes to the root server. All the servers are administrated by IANA. And it's going to send the information, hey, what's the IP address for www.example.com? And if the root server doesn't know it, it's going to let you know, hey, ask the top-level domain name server, in this case, the .com. It's a top-level domain name server. So, you go ahead and ask this top-level domain name server to do that for you. In this case, again, the .com and you asked, hey, what's the IP address for example.com? And if the top-level domain name server doesn't know, it's going to ask you, hey, ask example.com. And example.com is actually within the customer's domain. And then based on these instructions you ask, what is the IP address for www.example.com? So, it will provide you with the IP address. And once your DNS server has the IP address, then it's going to relate to your web browser. And this is where your web browser actually reaches 96.7.128.198. Very interesting, isn't it? 16:23 Lois: Absolutely! Sergio, you mentioned top-level domain names. What are they and how are they useful? Sergio: A top level domain is the rightmost segment of a domain name, and it's located after the last visible dot in the domain name. So oracle.com or cloud.oracle.com is a domain name. So, .com is a top-level domain. And the purpose of the top-level domain is to recognize certain elements of a website. This top-level domain indicates that this is a commercial site. Now, .edu, for example, is a top-level domain name for higher education. We also have .org for nonprofit organizations, .net for network service providers. And we also have country specific. .ca for Canadian websites, .it for Italian websites. Now .it, a lot of companies that are in the information technology business utilizes this one to indicate that they're in information technology. There's also the .us. And for US companies, most of the time this is optional. .com, .org, .net is understood that they are from the US. Now if .com is a top-level domain name, what is that .oracle in cloud? So, Oracle is the second-level domain name. And in this case, Cloud is the third-level domain name. And lately you've been seeing a lot more top-level domain names. These are the classic ones. But now you get .AI, .media, .comedy, .people, and so on and so forth. You have many, many, even companies now have the option of registering their company name as the top-level domain name. 18:24 Nikita: Thank you, Sergio, for this deep dive into local area networks and domain name systems. If you want to learn about the topics we covered today, go to mylearn.oracle.com and search for the Cloud Tech Jumpstart course.  Lois: And don't forget to join us next week for another episode on networking essentials. Until next time, this is Lois Houston… Nikita: And Nikita Abraham, signing off! 18:46 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.

Technology Tap
The One Hundred Episode

Technology Tap

Play Episode Listen Later Oct 28, 2025 24:28 Transcription Available


professorjrod@gmail.comThe mic feels heavier at 100—not from gear, but from history. We started with a doctoral dare, a $40 class, and a shaky first recording. We built a library that helped learners pass A+, Network+, and Security+ while connecting the dots between hardware, operating systems, storage, networking, and the human choices behind every device and policy. Along the way, our mission sharpened: pair skill with story, prioritize curiosity over checkboxes, and keep ethics at the center of cybersecurity and cloud.We revisit the moments that defined the journey: early fundamentals that formed a base, a pivot into security architecture and zero trust, and the realization that protocols carry purpose. DHCP becomes resource allocation. Firewalls express trust. Wireshark reveals perspective. The show grew with the audience—from notes to narratives to lived stories sent from classrooms, help desks, and late-night study sessions. A single email about subnets “finally clicking” mattered more than download spikes, shaping how we teach: simpler words, stronger analogies, and transparent context.Five pillars now anchor everything we make: accessibility for every learner and veteran, context that grounds acronyms in origin, curiosity that asks better questions, community that turns listeners into collaborators, and reflection that slows tech long enough for wisdom to land. We also share the personal side—health resets, renewed consistency, and the choice to keep going when the stats dip—because sustainable teaching requires a sustainable teacher.Looking ahead, we're doubling down on practical Q&A, live sessions, and clear paths through Network+, Security+, and cloud that never lose sight of ethics and inclusion. If you found value in the archive—from storage myths to authentication breakthroughs—help steer the next hundred. Subscribe, share with a friend who's studying, and send your biggest question for episode 101. Your curiosity sets the agenda.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Technology Tap
A Plus+ Fundamentals: Network Language, Decoded Chapter 6

Technology Tap

Play Episode Listen Later Oct 21, 2025 25:11 Transcription Available


professorjrod@gmail.comEver wish the network would just explain itself? We walk through the real language of connectivity—how links come alive, how packets choose their paths, and how a few core ideas unlock routers, firewalls, addressing, and the exam questions that test them. It starts with the wire (and the air): DSL over copper, cable scaling with DOCSIS, fiber to an ONT at your home, and why fixed wireless, satellite, and 5G fill coverage gaps with very different tradeoffs in speed and latency. From there, we draw the line between moving traffic and governing it. Routers forward based on IP and subnets; firewalls enforce policy using IPs, protocols, and ports—think velvet rope, but for packets.We bring the TCP/IP stack down to earth with a clean mental model of layers and encapsulation, then dig into IPv4 addressing, subnet masks, and private ranges that rely on NAT to share a single public IP. You'll learn why static IPs belong on printers and servers, how DHCP's DORA flow keeps clients online, and what APIPA is telling you when a lease fails. We also size up IPv6—128-bit addresses, hexadecimal notation, dual stack—and unpack the practical roadblocks that slow adoption despite the promise of massive address space.Transport choices make or break performance, so we compare TCP's three‑way handshake and delivery guarantees with UDP's low-latency approach favored by streaming and gaming. We highlight the ports every tech should know—22, 53, 80, 443, 67/68, 21/20, 3389—because port literacy speeds troubleshooting. On identity and isolation, we translate DNS records (A, AAAA, CNAME, MX, TXT) into everyday use and show how VLANs reduce broadcast noise while VPNs protect data over untrusted networks. To cement it all, we run live quiz walkthroughs and model how to spot keywords, eliminate distractors, and reason under time pressure—skills you can carry straight into the CompTIA A+ and beyond.If this helped you think more clearly about networks, follow the show, leave a rating, and share it with a friend who's studying. Got a topic you want us to deep-dive next—DHCP, DNS, or VLANs? Drop a note and subscribe so you don't miss the next breakdown.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

Packet Pushers - Full Podcast Feed
N4N035: Well Actually . . . Listener Comments and Corrections

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jul 31, 2025 46:35


We ask listeners for follow up and you’ve sent it in. On today’s show we respond to listener comments and corrections on tunneling, the link aggregation control protocol, link aggregation in general, and DHCP options. We also talk about the network engineering certification journey. If you’ve got a “Well, actually” or any other follow up,... Read more »

Packet Pushers - Fat Pipe
N4N035: Well Actually . . . Listener Comments and Corrections

Packet Pushers - Fat Pipe

Play Episode Listen Later Jul 31, 2025 46:35


We ask listeners for follow up and you’ve sent it in. On today’s show we respond to listener comments and corrections on tunneling, the link aggregation control protocol, link aggregation in general, and DHCP options. We also talk about the network engineering certification journey. If you’ve got a “Well, actually” or any other follow up,... Read more »

Telecom Reseller
Reinventing the Network: Alkira and Astrotel Bring Infrastructure-as-a-Service to the Cloud Era, Podcast

Telecom Reseller

Play Episode Listen Later Jul 23, 2025


“You can now connect everything—cloud workloads, offices, data centers, users—on one software-defined network, without the hardware.” — Elizabeth Aris, CEO, Astrotel In this Technology Reseller News podcast, Publisher Doug Green interviews David Klebanov, a leading architect at Alkira, and Elizabeth Aris, CEO of Astrotel, to explore how their partnership is delivering Network Infrastructure as a Service (NIaaS) to global enterprises—without the capital investment or complexity of traditional networking. Born in the Cloud, Built for the AI Era Alkira, founded in 2018, was born with a vision to deliver networking the same way cloud services are consumed: on demand, scalable, and usage-based. The Alkira platform runs entirely in the cloud—across AWS, Azure, and Google Cloud—allowing enterprises to deploy secure, high-performance global networks in hours, not months. “Our platform is the networking and security foundation for today's distributed, cloud-first enterprise,” said Klebanov. “And it's built to support AI workloads and multi-cloud architectures from day one.” Channel-Driven and Globally Deployed Astrotel, based in Sydney, is a service provider and Alkira partner helping customers across the Asia-Pacific region deploy network services in minutes using Alkira's cloud-native platform. Aris emphasized the advantage: no hardware, no CapEx, and up to 60% cost savings. “We're setting up entire global networks using Alkira's software-based cloud exchange points. It's a massive differentiator,” said Aris. “From remote Australia to Hong Kong to London, you just connect your sites to the nearest cloud region—there's no need to negotiate with local telcos or install new gear.” Enterprise-Grade Security and Simplicity The Alkira platform integrates firewall, DNS, DHCP, and other critical services directly into its virtualized architecture. IT teams can manage and secure the network through Alkira's centralized portal—or via REST APIs and Terraform for programmatic deployments. A single control plane manages the entire hybrid network—connecting public cloud workloads, private data centers, branch offices, remote users, and partner networks. This includes secure extranet support for M&A environments, allowing partial segmentation during network convergence. A Win for Carriers, Too Interestingly, carriers are also using Alkira to extend their reach. Aris explained that tier-one telcos are deploying Alkira to serve customers in markets where they lack infrastructure. “Instead of buying wholesale access from foreign providers, they spin up Alkira and deliver services in hours. It's flexible, fast, and operationally simple.” Where to Learn More Visit alkira.com to explore Alkira's cloud-first networking platform. Visit astrotel.io to learn how Astrotel deploys Alkira services across Asia-Pacific. Partner Opportunities: Alkira's 100% channel-focused model is open to partners in the U.S., Canada, and globally who are ready to offer NIaaS and cloud-native connectivity solutions.

CiscoChat Podcast
Cisco Tech Stories - ep 24 - Snoop Dogged - NexusOS crisis

CiscoChat Podcast

Play Episode Listen Later Jul 1, 2025 48:49


In this episode, Brandon tells us the story of the time a critical issue was discovered the day before the Cisco Live US event started. A race against the clock then starts to find a workaround before the attendees arrive. We discuss DHCP snooping and Cisco Live event network preparation.

Cables2Clouds
Network engineers already understand Kubernetes better than they think.

Cables2Clouds

Play Episode Listen Later Jun 25, 2025 38:10 Transcription Available


Send us a textThe invisible threads connecting Kubernetes and networking infrastructure form the backbone of today's cloud-native world. In this revealing conversation with Marino Wijay from Kong, we unravel the complex relationship between traditional networking concepts and modern container orchestration.Marino brings a unique perspective as someone who entered the Kubernetes ecosystem through networking, explaining how fundamental networking principles directly translate to Kubernetes operations. "If you don't have a network, there is no Kubernetes," he emphasizes, highlighting how reachability between nodes forms the foundation of cluster communication.The network evolution within Kubernetes proves fascinating – from the early "black box" approach where connectivity was implicit to the sophisticated Container Network Interfaces (CNIs) like Cilium that offer granular control. Network engineers approaching Kubernetes for the first time might feel overwhelmed, but as we discover, concepts like DHCP with DNS registration, NAT, and load balancing all have direct parallels within the Kubernetes networking model.Our discussion ventures into the practical challenges organizations face when implementing service mesh technologies. While offering powerful capabilities for secure pod-to-pod communication through mutual TLS, service mesh introduces significant complexity. Marino shares insights on when this investment makes sense for enterprises versus smaller organizations with more controlled environments.The conversation takes an especially interesting turn when exploring how AI workloads are transforming Kubernetes networking requirements. From GPU-enabled clusters to specialized traffic patterns and the concept of Dynamic Resource Allocation as "QoS for AI," we examine how these resource-intensive applications are pushing the boundaries of what's possible.Whether you're a network engineer curious about containers or a Kubernetes administrator looking to deepen your networking knowledge, this episode bridges crucial gaps between these interconnected worlds. Subscribe to Cables to Clouds for more insights at the intersection of networking and cloud technologies!https://www.linkedin.com/in/mwijay/Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj

Hacker Public Radio
HPR4391: HPR Community News for May 2025

Hacker Public Radio

Play Episode Listen Later Jun 2, 2025


This show has been flagged as Explicit by the host. New hosts There were no new hosts this month. Last Month's Shows Id Day Date Title Host 4369 Thu 2025-05-01 What LP records do I have? Fred Black 4370 Fri 2025-05-02 Playing Civilization IV, Part 8 Ahuka 4371 Mon 2025-05-05 HPR Community News for April 2025 HPR Volunteers 4372 Tue 2025-05-06 The power of GNU Readline - part 4 Some Guy On The Internet 4373 Wed 2025-05-07 Rsync with stdin as source oxo 4374 Thu 2025-05-08 24-25 New Years Eve show 7 Honkeymagoo 4375 Fri 2025-05-09 Long Chain Carbons,Eggs and Dorodango? operat0r 4376 Mon 2025-05-12 Re-research Lee 4377 Tue 2025-05-13 Password store and the pass command Klaatu 4378 Wed 2025-05-14 SQL to get the next_free_slot norrist 4379 Thu 2025-05-15 Mapping Municipalities' Digital Dependencies Trollercoaster 4380 Fri 2025-05-16 Isaac Asimov: The Rest of Asimov's Foundation Stories Ahuka 4381 Mon 2025-05-19 What Omni-Instantness Makes To My Brain and Your Brain? Antoine 4382 Tue 2025-05-20 Understanding Antenna Gain and the Decibel scale Paulj 4383 Wed 2025-05-21 Changing font in Arch Linux (Wayland) oxo 4384 Thu 2025-05-22 Browser and dedicated apps on the mobile phone Henrik Hemrin 4385 Fri 2025-05-23 Cable un-managment lol operat0r 4386 Mon 2025-05-26 Silly Tavern Spicy Roll Play operat0r 4387 Tue 2025-05-27 Did she say she flew light aircraft?! Elsbeth 4388 Wed 2025-05-28 BSD Overview norrist 4389 Thu 2025-05-29 Comments on hpr4373 Rho`n 4390 Fri 2025-05-30 Playing Civilization IV, Part 9 Ahuka Comments this month These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 40 comments in total. Past shows There are 9 comments on 6 previous shows: hpr3511 (2022-01-17) "Podman like Vagrant" by Klaatu. Comment 1: Some Guy on the Internet on 2025-05-16: "It's show time" hpr4036 (2024-01-22) "The Tildeverse" by Claudio Miranda. Comment 2: leeand0 on 2025-05-25: "Another Public Access Unix" Comment 3: leeand0 on 2025-05-25: "Another Public Access Unix" hpr4072 (2024-03-12) "Piper text to speech engine" by Archer72. Comment 1: Archer72 on 2025-05-20: "Voice synthesis" hpr4281 (2024-12-30) "My ridiculously complicated DHCP setup at home" by Jon The Nice Guy. Comment 2: Windigo on 2025-05-23: "As advertised" hpr4367 (2025-04-29) "My first episode; 001 Introduction" by oxo. Comment 1: Torin Doyle on 2025-05-09: "Welcome!" Comment 2: archer72 on 2025-05-09: "Welcome. " Comment 3: oxo on 2025-05-30: "Thank you" hpr4368 (2025-04-30) "Lessons learned moderating technical discussion panels" by Trixter. Comment 1: Reto on 2025-05-06: "A link to one or more" This month's shows There are 31 comments on 15 of this month's shows: hpr4371 (2025-05-05) "HPR Community News for April 2025" by HPR Volunteers. Comment 1: Paul on 2025-05-05: "mp3 quality "Comment 2: Ken Fallon on 2025-05-05: "Good question !"Comment 3: Henrik Hemrin on 2025-05-08: "Community" hpr4372 (2025-05-06) "The power of GNU Readline - part 4" by Some Guy On The Internet. Comment 1: Torin Doyle on 2025-05-09: "SGOTI is so likeable."Comment 2: Dave Morriss on 2025-05-17: "VI Mode" hpr4373 (2025-05-07) "Rsync with stdin as source" by oxo. Comment 1: Paulj on 2025-05-09: "rsync capabilities"Comment 2: archer72 on 2025-05-09: "Rsync - paulj"Comment 3: Dave Morriss on 2025-05-17: "Enjoyable show!" hpr4374 (2025-05-08) "24-25 New Years Eve show 7" by Honkeymagoo. Comment 1: ClaudioM on 2025-05-08: "Ha! The signoff!" hpr4375 (2025-05-09) "Long Chain Carbons,Eggs and Dorodango?" by operat0r. Comment 1: Torin Doyle on 2025-05-09: "The cruelty of the egg industry."Comment 2: Bob on 2025-05-09: "Free range eggs"Comment 3: Some Guy on the Internet on 2025-05-16: "@Bob, Free range eggs." hpr4376 (2025-05-12) "Re-research" by Lee. Comment 1: paul on 2025-05-12: "sonos play back"Comment 2: Lee on 2025-05-13: "Sonos"Comment 3: Some Guy on the Internet on 2025-05-16: "LLMs in academic research" hpr4377 (2025-05-13) "Password store and the pass command" by Klaatu. Comment 1: Some Guy on the Internet on 2025-05-16: "Great show." hpr4379 (2025-05-15) "Mapping Municipalities' Digital Dependencies" by Trollercoaster. Comment 1: Some Guy on the Internet on 2025-05-25: " I agree with the intentions." hpr4380 (2025-05-16) "Isaac Asimov: The Rest of Asimov's Foundation Stories" by Ahuka. Comment 1: Some Guy on the Internet on 2025-05-27: "I'll have a go." hpr4381 (2025-05-19) "What Omni-Instantness Makes To My Brain and Your Brain?" by Antoine. Comment 1: Ken Fallon on 2025-03-19: "Interesting show."Comment 2: Antoine on 2025-03-20: "Nice study =)"Comment 3: Some Guy on the Internet on 2025-05-25: "My two cents."Comment 4: Antoine on 2025-05-29: "Education" hpr4384 (2025-05-22) "Browser and dedicated apps on the mobile phone" by Henrik Hemrin. Comment 1: lyunpaw@gmail.com on 2025-05-27: "I agree." hpr4385 (2025-05-23) "Cable un-managment lol" by operat0r. Comment 1: Some Guy on the Internet on 2025-05-27: "It's over 9000!" hpr4387 (2025-05-27) "Did she say she flew light aircraft?!" by Elsbeth. Comment 1: archer72 on 2025-05-18: "Thank you for sharing"Comment 2: KEVIN B OBRIEN on 2025-05-29: "I loved the show"Comment 3: Jim DeVore on 2025-05-31: "Thanks for the inspiration" hpr4388 (2025-05-28) "BSD Overview" by norrist. Comment 1: Dave Morriss on 2025-05-29: "Thanks for this"Comment 2: Jim DeVore on 2025-05-31: "Thank you!" hpr4389 (2025-05-29) "Comments on hpr4373" by Rho`n. Comment 1: oxo on 2025-05-29: "Hi Rho`n"Comment 2: Dave Morriss on 2025-05-29: "Good episode" Mailing List discussions Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mailing List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman. The threaded discussions this month can be found here: https://lists.hackerpublicradio.com/pipermail/hpr/2025-May/thread.html Events Calendar With the kind permission of LWN.net we are linking to The LWN.net Community Calendar. Quoting the site: This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page. Provide feedback on this episode.

Packet Pushers - Full Podcast Feed
N4N025: DHCP – Someone Get Me an Address!

Packet Pushers - Full Podcast Feed

Play Episode Listen Later May 8, 2025 56:43


The Dynamic Host Configuration Protocol (DHCP) assigns an IP address to a host that joins a network, along with other information necessary for the host to communicate. DHCP also has more to it, so this week’s episode is meant to be a solid introduction to this essential network protocol. We first discuss what it is... Read more »

Packet Pushers - Fat Pipe
N4N025: DHCP – Someone Get Me an Address!

Packet Pushers - Fat Pipe

Play Episode Listen Later May 8, 2025 56:43


The Dynamic Host Configuration Protocol (DHCP) assigns an IP address to a host that joins a network, along with other information necessary for the host to communicate. DHCP also has more to it, so this week’s episode is meant to be a solid introduction to this essential network protocol. We first discuss what it is... Read more »

Daytoday
Bloqueo de publicidad

Daytoday

Play Episode Listen Later Mar 5, 2025 20:27


Capítulo 2296 del 5 mar 2025 Ya tengo funcionando el servicio que me bloquea la publicidad, aunque con mayor o menos éxito, pero lo más importante es el nuevo servidor DHCP. Si quieres apoyar este podcast, invítame a un café me ayudaras a mantenerme despierto y a los gastos de este podcast. Únete al grupo de telegram del podcast en t.me/daytodaypod. Usa el enlace de afiliado de Amazon para ayudar a mantener el podcast. Soy miembro de la Asociación Podcast. Si te registras y usas el código SP7F21 tendrás 5€ de descuento el primer año. https://www.asociacionpodcast.es/registrarse/socio/?coupon=SP7F21 Date de alta en Curve con este código y conseguiremos 5£: DO6QR47E Ya sabéis que podéis escribirme a @spascual, spascual@spascual.es el resto de métodos de contacto en https://spascual.es/contacto.

Daytoday
AdGuard y servidor DHCP

Daytoday

Play Episode Listen Later Mar 4, 2025 16:35


Capítulo 2295 del 4 mar 2025 Por culpa de mi amigo Rafa, en vez de comprar un nuevo router, me he metido en el lio de instalar AdGuard, un bloqueador de anuncios que también hace de servidor DHCP. Si quieres apoyar este podcast, invítame a un café me ayudaras a mantenerme despierto y a los gastos de este podcast. Únete al grupo de telegram del podcast en t.me/daytodaypod. Usa el enlace de afiliado de Amazon para ayudar a mantener el podcast. Soy miembro de la Asociación Podcast. Si te registras y usas el código SP7F21 tendrás 5€ de descuento el primer año. https://www.asociacionpodcast.es/registrarse/socio/?coupon=SP7F21 Date de alta en Curve con este código y conseguiremos 5£: DO6QR47E Ya sabéis que podéis escribirme a @spascual, spascual@spascual.es el resto de métodos de contacto en https://spascual.es/contacto.

Hacker Public Radio
HPR4286: HPR Community News for December 2024

Hacker Public Radio

Play Episode Listen Later Jan 6, 2025


This show has been flagged as Explicit by the host. table td.shrink { white-space:nowrap } hr.thin { border: 0; height: 0; border-top: 1px solid rgba(0, 0, 0, 0.1); border-bottom: 1px solid rgba(255, 255, 255, 0.3); } New hosts Welcome to our new hosts: Paulj, Jon The Nice Guy. Last Month's Shows Id Day Date Title Host 4261 Mon 2024-12-02 HPR Community News for November 2024 HPR Volunteers 4262 Tue 2024-12-03 DIY C02 operat0r 4263 Wed 2024-12-04 An interview with Adam Matthews about the Disco Pigeon Ken Fallon 4264 Thu 2024-12-05 Mintcast, high crimes and misdemeanors. Some Guy On The Internet 4265 Fri 2024-12-06 Drivecasting: arm sleeves, glasses and more. Some Guy On The Internet 4266 Mon 2024-12-09 What's the weather? Lee 4267 Tue 2024-12-10 Borderlands Movie Review Kevie 4268 Wed 2024-12-11 Book review and an Emacs rabbit-hole enistello 4269 Thu 2024-12-12 What is on My Podcast Player 2024, Part 2 Ahuka 4270 Fri 2024-12-13 Playing Civilization IV, Part 4 Ahuka 4271 Mon 2024-12-16 Beginners guide to Proxmox Al 4272 Tue 2024-12-17 Embed Mastodon Threads hairylarry 4273 Wed 2024-12-18 Improving videography with basic manual settings Trixter 4274 Thu 2024-12-19 The Wreck - I'm alright! Archer72 4275 Fri 2024-12-20 What is on My Podcast Player 2024, Part 3 Ahuka 4276 Mon 2024-12-23 PWNED operat0r 4277 Tue 2024-12-24 Introduction episode by Paul Paulj 4278 Wed 2024-12-25 Pi powered Christmas Tree Kevie 4279 Thu 2024-12-26 What is on My Podcast Player 2024, Part 4 Ahuka 4280 Fri 2024-12-27 Isaac Asimov: The Foundation Ahuka 4281 Mon 2024-12-30 My ridiculously complicated DHCP setup at home Jon The Nice Guy 4282 Tue 2024-12-31 Backup Power for my Gas Furnace Trey Comments this month These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 26 comments in total. Past shows There are 7 comments on 4 previous shows: hpr3531 (2022-02-14) "Barrier: Software KVM" by Windigo. Comment 3: SolusSpider - Peter Paterson on 2024-12-01: "Fellow user of Barrier, and also InputLeap." hpr4070 (2024-03-08) "Civilization III" by Ahuka. Comment 1: Red Orm on 2025-01-01: "hpr4070 :: Civilization III" Comment 2: Kevin O'Brien on 2025-01-02: "Thank you" hpr4258 (2024-11-27) "Introduction and History of Using Computers" by SolusSpider. Comment 5: Spartan Minter on 2024-12-02: "Linux Mint " Comment 6: ClaudioM on 2024-12-03: "Hey Solusspider! Great First Episode!" hpr4260 (2024-11-29) "The Golden Age" by Ahuka. Comment 1: Moss Bliss on 2025-01-01: "Penguicon" Comment 2: Kevin O'Brien on 2025-01-01: "Sorry to hear it" This month's shows There are 19 comments on 10 of this month's shows: hpr4264 (2024-12-05) "Mintcast, high crimes and misdemeanors." by Some Guy On The Internet. Comment 1: Henrik Hemrin on 2024-12-06: "Thunderbird"Comment 2: Majid on 2024-12-07: "Mintcast and Thunderbird"Comment 3: Dave Morriss on 2024-12-14: "Thunderbird and email management" hpr4266 (2024-12-09) "What's the weather?" by Lee. Comment 1: Lee on 2024-10-21: "Errata" hpr4268 (2024-12-11) "Book review and an Emacs rabbit-hole" by enistello. Comment 1: Henrik Hemrin on 2024-12-15: "Thanks for the book tip" hpr4269 (2024-12-12) "What is on My Podcast Player 2024, Part 2" by Ahuka. Comment 1: Random listener on 2024-12-13: "Request for a bit more info in show notes" hpr4272 (2024-12-17) "Embed Mastodon Threads" by hairylarry. Comment 1: Ken Fallon on 2024-11-28: "Wayne Myers ?? Where did I hear that name before ?"Comment 2: Henrik Hemrin on 2024-12-18: "How is the post behaviour on Mastodon reflected on the web site?"Comment 3: Reto on 2024-12-25: "Plain text is not" hpr4274 (2024-12-19) "The Wreck - I'm alright!" by Archer72. Comment 1: SolusSpider - Peter Paterson on 2024-12-19: "I'm Mark's hospital room stalker!"Comment 2: Paulj on 2024-12-30: "Thanks for Sharing!" hpr4276 (2024-12-23) "PWNED" by operat0r. Comment 1: JonTheNiceGuy on 2024-12-28: "Exposed RDP, at least it wasn't VNC (which I did!), and VPN" hpr4277 (2024-12-24) "Introduction episode by Paul" by Paulj. Comment 1: SolusSpider - Peter Paterson on 2024-12-24: "Welcome Paul to HPR"Comment 2: Trey on 2024-12-24: "Welcome"Comment 3: Paul on 2024-12-25: "Thanks Peter"Comment 4: Paulj on 2024-12-26: "Thanks Trey!" hpr4280 (2024-12-27) "Isaac Asimov: The Foundation" by Ahuka. Comment 1: Red Orm on 2025-01-01: "hpr4280 :: Isaac Asimov: The Foundation"Comment 2: Kevin O'Brien on 2025-01-02: "Thank you" hpr4281 (2024-12-30) "My ridiculously complicated DHCP setup at home" by Jon The Nice Guy. Comment 1: Paulj on 2024-12-30: "Welcome, and thanks!" Mailing List discussions Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mailing List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman. The threaded discussions this month can be found here: https://lists.hackerpublicradio.com/pipermail/hpr/2024-December/thread.html Events Calendar With the kind permission of LWN.net we are linking to The LWN.net Community Calendar. Quoting the site: This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page. Any other business Thanks to all 59 HPR contributors in 2024! Ahuka, Al, Andrew Conway, Archer72, Beeza, Beto, Bob, Brian in Ohio. Cedric De Vroey, Celeste, Claudio Miranda, Clinton Roy, Cov, crvs, Daniel Persson, Dave Hingley. Dave Morriss, Deltaray, dnt, dodddummy, enistello, Fred Black, gemlog, geospart. hairylarry, Henrik Hemrin, hobs, Honkeymagoo, HPR Volunteers, Jeroen Baten, Jon The Nice Guy, Ken Fallon. Kevie, Kinghezy, knightwise, Lee, Lochyboy, mnw, Moss Bliss, Mr. Young. MrX, Ne01sfree, Noodlez, norrist, operat0r, Paulj, Quvmoh, Rho`n. SolusSpider, Some Guy On The Internet, Stache_AF, Swift110, Thaj Sara, thelovebug, thompsgj, Trey. Trixter, Trollercoaster, Windigo. Provide feedback on this episode.

Hacker Public Radio
HPR4281: My ridiculously complicated DHCP setup at home

Hacker Public Radio

Play Episode Listen Later Dec 30, 2024


This show has been flagged as Clean by the host. Hello, this is Jon The Nice Guy, and after 10 years of knowing about Hacker Public Radio, here is my first podcast for the network. Firstly, I want to give a shout out to my Admin Admin Podcast co-host Al, who I heard just a week-or-so ago talking about Proxmox! Glad to hear you're over here too! I wanted to record an episode on my ridiculously complicated DHCP setup at home. I'm not saying this is the right or even a good idea for anyone else, but it's something you might want to do. Firstly, a little about why I have a complicated DHCP setup, and it starts with the router my previous ISP gave me. My router could just about cope with serving DHCP, but at the time when I was experimenting with running services on my home lab, the DNS server on the router wouldn't return addresses for hosts on my network, just those on the public internet. This wasn't a great experience! So, I installed PiHole [1] - initially because I'd heard good things about it's ad blocking capabilities, but later because it was just a pretty and sensible DHCP and DNS server that I could do things with. Under the covers, PiHole is running DNSMasq [2], which means that all the configuration is plain text files that I can overwrite with Ansible [3]. My PiHole was running on a Raspberry Pi 2 [4], in a lego-style case [5] plugged into the back of my router. And this was fine for a few months. And then it ran out of storage space, I changed jobs, my wife complained one too many times, and I reverted back to using the router's DHCPd and DNS. I also picked up either Nebula [6] or Tailscale [7] at around that time too, so I didn't need internal DNS to resolve to home services any more, and anything public I setup external DNS records pointing to the internal addresses. Job done. Scrub forward a couple of years, and when I changed jobs, I got a joining bonus which paid for me to get wired network around my house. I also setup my own Proxmox [8] cluster, which I documented on a post [9] on my blog [10]. Again, everything was peachy. I setup home assistant [11], which I expose on to the internet via a proxy on my VPS, and everything was still good... but things are a little more complicated now - I've got more stuff to keep track of and the router's DHCP server was struggling a little... but it was all OK. And then I changed ISP. My new ISP shipped a router running a customized version of OpenWRT [12], and I thought, finally, a good router! And then I realised I couldn't do *anything* sensible with it. It was so locked down, I couldn't even change the admin password without factory resetting it! Ugh. Within a couple of weeks my wife was complaining about random intermittent DNS requests failing, and I was seeing it too. So, I found on the Proxmox Helper Scripts [13] website that someone had put a script to setup a PiHole instance... So naturally, as I had two Proxmox Servers by this point, I ran two PiHole servers. This lasted a few months until I performed a system upgrade to the proxmox cluster and it took down both Proxmox cluster members at the same time and DNS fell off the network! I revived the Raspberry Pi 2 which now sits attached to the router again! Yes! Meanwhile, I was now getting more into IoT and I had several Tuya IoT devices connected over Wifi, and the 254 network addresses available in the /24 sized network [14] to me at home didn't seem enough, so I decided to expand my network to a /22, giving me enough address space for 1022 devices. Plus, I have kids, who each have computers and phones and games devices, my wife and I both work from home, so we both have computers from work and our own devices too... so I decided, now is the time to plan out my network. I decided to use PHPIPAM [15] having been asked to look at it at work, and found it was a good fit for what I wanted to do with it. PHPIPAM is really designed for owners of large-scale networks, people who allocate chunks of public IP scopes and IPv6 address ranges, but it will subdivide smaller network blocks, and so I could carve up my network. I decided to split my /22 into four /24 networks. One was dedicated to DHCP addressed items, with one smaller subnet in there allocated to the Proxmox hosted PiHole and another to the Raspberry Pi hosted PiHole, and both are basically a catch-all for anything I've not yet allocated. One was for end-user devices, like phones, computers, TVs and Games Consoles separated into smaller subnets per-person and one additional subnet for room-shared devices like TVs and Games Consoles. One subnet was separated into smaller subnets for IoT devices and core network things, like mains and network switches, light bulbs, cameras and printers. The last /24 subnet was undivided, but was for servers, both physical and virtual. Great, I've now got a lovely network map [IMAGE1], but *ugh* I've got to transfer all those DHCP and static IP allocations to the PiHoles. And, while I'd been using Gravity Sync [15] to synchronize between the two PiHole devices, sometimes it took a while for Gravity Sync to sync. And over time, I wanted to expose some of those services I was running at home, to my family, at home. So, I turned to Ansible. A few years ago, I'd helped write some Ansible modules which were used to interact with a cloud service my employer at the time was running, so I had a kind of idea on how Ansible works under the surface, the documentation for writing a new set of lookups was OK, and ChatGPT helped where I lost my way. I knew that there was a Terraform [17] Provider [18] for PHPIPAM, so there was a working API... and so I knew I could look up data in PHPIPAM. I wrote some Ansible lookups [19] to confirm the data was accessible from PHPIPAM, and it was! Great, now all I needed to do was to drop files into PiHole. I'd heard Alex [20] from the Self Hosting Podcast [21] talking about how he wrote some Ansible to automate his PiHole management [22], but it assumed a lot about how your network was setup and integrated a lot with other things he did - no complaints there! It's his network after all! But so I knew I needed to do 5 things. 1. Create a list of static DHCP allocations on both PiHole devices. 2. Create a list of DNS names to resolve in the internal network to addresses via A records 3. Create a list of DNS names to resolve to other DNS names via CNAME records 4. Create a list of DNS wildcards, so anything ending in that name would appear in my network. 5. If anything changed, restart DNSMasq. I wrote this code and ran it. Well, ran it and it didn't work, so I fixed it and ran it again... and again and again until it did work. I've just added that to my Github today, so feel free to take a look [23]. You've spent a while listening to this, so what is my "too long, didn't listen"? I have two pihole devices, I run a phpipam service under docker on a LXC container on my proxmox server. On the same LXC container I have a cron job which triggers the ansible playbook every 5 minutes to push any updates to PHPIPAM to the pihole hosts. Every few days I check to see what hosts have turned up in the DHCP pools on the PiHole hosts, map those to hosts I want to track in the future, and allocate them addresses in PHPIPAM so that those hosts will get managed IP addresses after 5 minutes, the next time they renew their DHCP addresses... Tada! For more over engineered solutions like this, feel free to take a look at the content on my blog, or maybe I'll appear again, on Hacker... Public... Radio. Take care, 73. [1] PiHole: https://pi-hole.net/ [2] DNSMasq: https://thekelleys.org.uk/dnsmasq/doc.html [3] Ansible: https://ansible.com [4] Raspberry Pi: https://www.raspberrypi.com/products/ [5] Lego style case: https://www.amazon.co.uk/gp/product/B015WVR5BS [6] Nebula: https://www.defined.net/ [7] Tailscale: https://tailscale.com/ [8] Proxmox: https://www.proxmox.com [9] Proxmox post: https://jon.sprig.gs/blog/post/2885 [10] My blog: https://jon.sprig.gs [11] Home Assistant: https://www.home-assistant.io/ [12] OpenWRT: https://openwrt.org/ [13] Helper Scripts: https://community-scripts.github.io/ProxmoxVE/ [14] Network address spreadsheet: https://gist.github.com/JonTheNiceGuy/a847aa4faf878d7d6cee5c069e1d66d6 [15] PHPIPAM: https://phpipam.net/ [16] Gravity Sync: https://github.com/vmstan/gravity-sync [17] Terraform: https://www.terraform.io/ [18] PHPIPAM Terraform Provider: https://registry.terraform.io/providers/lord-kyron/phpipam/latest [19] Ansible Lookup: https://gist.github.com/JonTheNiceGuy/289a8a2e0233e730f0fbc8f958ec4bc6 [20] Alex Kretzschmar: https://alex.ktz.me/ [21] Self Hosted Podcast: https://selfhosted.show/ [22] Fully Automated DNS and DHCP with PiHole and DNSMasq: https://blog.ktz.me/fully-automated-dns-and-dhcp-with-pihole-and-dnsmasq/ [23] ansible-pihole: https://github.com/JonTheNiceGuy/ansible-pihole [IMAGE1] https://jon.sprig.gs/blog/wp-content/uploads/2024/12/Screenshot-from-2024-12-20-19-29-22.png Provide feedback on this episode.

Paul's Security Weekly TV
Terms & Acronyms pt.2 - SWN Vault

Paul's Security Weekly TV

Play Episode Listen Later Nov 29, 2024 32:14


Check out this episode from the SWN vault, originally published on February 21, 2019! This Secure Digital Life episode was hand-picked by main host Doug White. Doug is at Vale and Russ is in charge of the show this week! Russ talks about his terms and acronyms. Russ talks about: DHCP, DNS, IP, USB, IEEE, SCADA, IoT, Internet of Things, Philips Hue, Zwave/Zigbee Homekit tech. Show Notes: https://securityweekly.com/vault-swn-22

Hack Naked News (Audio)
Terms & Acronyms pt.2 - SWN Vault

Hack Naked News (Audio)

Play Episode Listen Later Nov 29, 2024 32:14


Check out this episode from the SWN vault, originally published on February 21, 2019! This Secure Digital Life episode was hand-picked by main host Doug White. Doug is at Vale and Russ is in charge of the show this week! Russ talks about his terms and acronyms. Russ talks about: DHCP, DNS, IP, USB, IEEE, SCADA, IoT, Internet of Things, Philips Hue, Zwave/Zigbee Homekit tech. Show Notes: https://securityweekly.com/vault-swn-22

Hack Naked News (Video)
Terms & Acronyms pt.2 - SWN Vault

Hack Naked News (Video)

Play Episode Listen Later Nov 29, 2024 32:14


Check out this episode from the SWN vault, originally published on February 21, 2019! This Secure Digital Life episode was hand-picked by main host Doug White. Doug is at Vale and Russ is in charge of the show this week! Russ talks about his terms and acronyms. Russ talks about: DHCP, DNS, IP, USB, IEEE, SCADA, IoT, Internet of Things, Philips Hue, Zwave/Zigbee Homekit tech. Show Notes: https://securityweekly.com/vault-swn-22

Packet Pushers - Full Podcast Feed
IPB163: Know Your Options: DHCP vs. DHCPv6

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Oct 31, 2024 22:11


If you're going to use DHCPv6, you have options, but there are some things you need to know in order to be able to build out your DHCPv6 configuration properly. Today's IPv6 Buzz explores similarities and differences between DHCP and DHCPv6, particularly the operational model. And as always, you’ll want to verify and test before... Read more »

Packet Pushers - IPv6 Buzz
IPB163: Know Your Options: DHCP vs. DHCPv6

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Oct 31, 2024 22:11


If you're going to use DHCPv6, you have options, but there are some things you need to know in order to be able to build out your DHCPv6 configuration properly. Today's IPv6 Buzz explores similarities and differences between DHCP and DHCPv6, particularly the operational model. And as always, you’ll want to verify and test before... Read more »

The Six Five with Patrick Moorhead and Daniel Newman
Reinventing DDI for the Hybrid, Multi-Cloud Era

The Six Five with Patrick Moorhead and Daniel Newman

Play Episode Listen Later Oct 7, 2024 15:08


Six Five Media is live for a segment on network management within hybrid & multi-cloud environments! Host Steven Dickens is joined by Infoblox's Chief Product Officer, Mukesh Gupta, for a conversation on reinventing DDI (DNS, DHCP, and IPAM) solutions for modern hybrid and multi-cloud environments with their new Universal DDI Product Suite. Their discussion covers: The evolving landscape of DDI management in hybrid and multi-cloud environments Key features and innovations within the Universal DDI™ Product Suite How Infoblox's solutions are designed to meet the needs of modern enterprises The importance of scalability and security in DDI solutions for businesses today Insights into future trends in DDI management and cloud infrastructure  

linkmeup. Подкаст про IT и про людей
telecom №139. Облачные SDN. OVN

linkmeup. Подкаст про IT и про людей

Play Episode Listen Later Sep 25, 2024


На этот раз у нас тема, которую мы потрогали уже со всех сторон с разной глубиной проникновения - SDN. И более конкретно - облачный SDN, но не тот, который SD-WAN или какие-то облачные решения для клиентов - нет, мы говорим про то, как построить SDN для облака, как приватного, так и публичного, как дать пользователю прочувствовать свою уникальность несмотря на то, что на той же самой сети и том же самом сервере он далеко не один. Для разгорева и подготовки можно послушать telecom №101. Оверлейные сети Кто: Владислав Одинцов. Техлид в K2 Cloud (ex CROC Cloud) Александр Попов. Техлид команды Iaas Network в VK Cloud Про что: Будем говорить с позиции российских облаков, т.к. Размеры наши такие, какие есть, а не как AWS или GCP. Основа облаков - это IaaS уровень, вокруг которого достраиваются сервисы. IaaS это компьют + сторадж + сети + хранилище образов. Чтобы сети работали в облаке (между ВМ), все облачные провайдеры используют спец софт — SDN. SDN помогают создавать и управлять виртуальной сетью - делать её изолированной, предоставлять внутри неё сетевые функции: DHCP, routing, balancers. Где брать SDN? L2 против L3. Форкнул и дальше in-house? Или ответственно апстримить? Сложности при эксплуатации - регулярные обновления агентов, зоопарк версий, кросс-AZ изоляция, большое количество control-plane информации. Опыт допиливания OVN. Трудности с OVN. Сообщение telecom №139. Облачные SDN. OVN появились сначала на linkmeup.

Ask The Tech Guys (Audio)
HOT 181: Understanding HDMI eARC - NAS, DHCP, Upfront Edge

Ask The Tech Guys (Audio)

Play Episode Listen Later Sep 8, 2024 45:49


On this episode on Hands-On Tech, Mikah answers questions such as recommending a NAS to a listener, why you might not be getting DHCP in your home network, and whether the Upfront Edge program with Rogers in Canada is a good deal for upgrading your phone. Host: Mikah Sargent Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: betterhelp.com/ATG

All TWiT.tv Shows (MP3)
Hands-On Tech 181: Understanding HDMI eARC

All TWiT.tv Shows (MP3)

Play Episode Listen Later Sep 8, 2024 45:49


On this episode on Hands-On Tech, Mikah answers questions such as recommending a NAS to a listener, why you might not be getting DHCP in your home network, and whether the Upfront Edge program with Rogers in Canada is a good deal for upgrading your phone. Host: Mikah Sargent Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: betterhelp.com/ATG

The Tech Guy (Video HI)
HOT 181: Understanding HDMI eARC - NAS, DHCP, Upfront Edge

The Tech Guy (Video HI)

Play Episode Listen Later Sep 8, 2024 45:49


On this episode on Hands-On Tech, Mikah answers questions such as recommending a NAS to a listener, why you might not be getting DHCP in your home network, and whether the Upfront Edge program with Rogers in Canada is a good deal for upgrading your phone. Host: Mikah Sargent Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: betterhelp.com/ATG

Hands-On Tech (Video HD)
HOT 181: Understanding HDMI eARC - NAS, DHCP, Upfront Edge

Hands-On Tech (Video HD)

Play Episode Listen Later Sep 8, 2024 45:49


On this episode on Hands-On Tech, Mikah answers questions such as recommending a NAS to a listener, why you might not be getting DHCP in your home network, and whether the Upfront Edge program with Rogers in Canada is a good deal for upgrading your phone. Host: Mikah Sargent Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: betterhelp.com/ATG

Hands-On Tech (MP3)
HOT 181: Understanding HDMI eARC - NAS, DHCP, Upfront Edge

Hands-On Tech (MP3)

Play Episode Listen Later Sep 8, 2024 45:49


On this episode on Hands-On Tech, Mikah answers questions such as recommending a NAS to a listener, why you might not be getting DHCP in your home network, and whether the Upfront Edge program with Rogers in Canada is a good deal for upgrading your phone. Host: Mikah Sargent Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: betterhelp.com/ATG

All TWiT.tv Shows (Video LO)
Hands-On Tech 181: Understanding HDMI eARC

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Sep 8, 2024 45:49 Transcription Available


On this episode on Hands-On Tech, Mikah answers questions such as recommending a NAS to a listener, why you might not be getting DHCP in your home network, and whether the Upfront Edge program with Rogers in Canada is a good deal for upgrading your phone. Host: Mikah Sargent Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: betterhelp.com/ATG

Hands-On Tech (Video HI)
HOT 181: Understanding HDMI eARC - NAS, DHCP, Upfront Edge

Hands-On Tech (Video HI)

Play Episode Listen Later Sep 8, 2024 45:49


On this episode on Hands-On Tech, Mikah answers questions such as recommending a NAS to a listener, why you might not be getting DHCP in your home network, and whether the Upfront Edge program with Rogers in Canada is a good deal for upgrading your phone. Host: Mikah Sargent Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsor: betterhelp.com/ATG

EasyApple
#680: Non avrai altro IP all'infuori di me

EasyApple

Play Episode Listen Later Aug 30, 2024 46:47


Si parla di come comprimere foto e video senza comprometterne la qualità, di come vedere YouTube in maniera alternativa, di come progettare la propria rete wifi con Ubiquiti, di come funziona il DHCP, gli IP statici e la DHCP reservation.

Packet Pushers - Full Podcast Feed
IPB155: Operational Considerations: DHCP vs DHCPv6

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jul 11, 2024 24:43


What are the operational considerations and differences between DHCP and DHCPv6?  In today's episode we explore the implications for network management, security, and operational models. We also discuss the challenges of DHCPv6 failover, high availability, complex device tracking and identity management in various environments. Episode Links:  Scott's Infoblox IPv6 CoE blog post  Introducing DHCPv6 Prefix... Read more »

Packet Pushers - IPv6 Buzz
IPB155: Operational Considerations: DHCP vs DHCPv6

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Jul 11, 2024 24:43


What are the operational considerations and differences between DHCP and DHCPv6?  In today's episode we explore the implications for network management, security, and operational models. We also discuss the challenges of DHCPv6 failover, high availability, complex device tracking and identity management in various environments. Episode Links:  Scott's Infoblox IPv6 CoE blog post  Introducing DHCPv6 Prefix... Read more »

Paul's Security Weekly
Back To School: Networking 101 - SWN Vault

Paul's Security Weekly

Play Episode Listen Later Jun 18, 2024 26:29


Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ looks at MAC addresses, IP Addressing (Private/Public), DHCP, routing, and DNS. Show Notes: https://securityweekly.com/vault-swn-15

Paul's Security Weekly TV
Back To School: Networking 101 - SWN Vault

Paul's Security Weekly TV

Play Episode Listen Later Jun 18, 2024 26:29


Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ looks at MAC addresses, IP Addressing (Private/Public), DHCP, routing, and DNS. Show Notes: https://securityweekly.com/vault-swn-15

Hack Naked News (Audio)
Back To School: Networking 101 - SWN Vault

Hack Naked News (Audio)

Play Episode Listen Later Jun 18, 2024 26:29


Check out this interview from the SWN Vault, hand picked by main host Doug White! This Secure Digital Life segment was originally published on September 25, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ looks at MAC addresses, IP Addressing (Private/Public), DHCP, routing, and DNS. Show Notes: https://securityweekly.com/vault-swn-15

2.5 Admins
2.5 Admins 195: Execute Option 121

2.5 Admins

Play Episode Listen Later May 16, 2024 31:28


Why Windows 10 might be gaining users at Windows 11's expense, an old DHCP option is a potential risk for VPN users, we should probably say “renting” rather than “buying”domains, and avoiding tracking when using IPv6.   Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Jim was on […]

Late Night Linux All Episodes
2.5 Admins 195: Execute Option 121

Late Night Linux All Episodes

Play Episode Listen Later May 16, 2024 31:28


Why Windows 10 might be gaining users at Windows 11's expense, an old DHCP option is a potential risk for VPN users, we should probably say “renting” rather than “buying”domains, and avoiding tracking when using IPv6.   Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Jim was on... Read More

Paul's Security Weekly
Back to School: Networking 101 - SWN Vault

Paul's Security Weekly

Play Episode Listen Later Feb 20, 2024 26:46


Check out this interview from the SWN Vault, hand picked by main host Doug White! This segment was originally published on October 4, 2018. This week, Russ takes the reigns in the absence of Dr. Doug to talk about Networking 101! We are going to go back to school to examine how networking and the internet actually work. Russ looks at MAC addresses, IP Addressing (Private/Public), DHCP, routing, and DNS. Show Notes: https://securityweekly.com/vault-swn-11

Packet Pushers - Full Podcast Feed
IPB138: Making Sense Of DHCPv6 Prefix Delegation (DHCPv6-PD)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Nov 2, 2023 23:49


DHCPv6 Prefix Delegation (DHCPv6-PD) is an IETF RFC that lets one router delegate a long-lived prefix, using DHCP, to a requesting router. What’s the need for this? As the RFC notes, some applications expect stable addresses. It also notes: It is appropriate for situations in which the delegating router does not have knowledge about the... Read more »

Packet Pushers - Full Podcast Feed
IPv6 Buzz 138: Making Sense Of DHCPv6 Prefix Delegation (DHCPv6-PD)

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Nov 2, 2023 23:49


DHCPv6 Prefix Delegation (DHCPv6-PD) is an IETF RFC that lets a router delegate a long-lived prefix, using DHCP, to a requesting router. The hosts discuss how this is used today both by service providers and in the enterprise, and potential impacts on address allocation and planning. The post IPv6 Buzz 138: Making Sense Of DHCPv6 Prefix Delegation (DHCPv6-PD) appeared first on Packet Pushers.