Jump to content

davidna2002

Member
  • Posts

    116
  • Joined

  • Last visited

Awards

This user doesn't have any awards

Profile Information

  • Gender
    Male
  • Location
    CA

System

  • CPU
    Intel Core i7 6700K
  • Motherboard
    ASUS Z170 DELUXE
  • RAM
    16GB Corsair Dominator 3000MHz
  • GPU
    ASUS ROG STRIX GTX 1080 OC
  • Case
    Praxis Wetbench
  • Storage
    Samsung V-NAND M.2 SSD 950 PRO 512GB
  • PSU
    Corsair AX860i
  • Display(s)
    ASUS PB287Q 28" 4K/UHD
  • Cooling
    Corsair H100i V2
  • Keyboard
    WASD Code V2B
  • Mouse
    Razer Death Adder

Recent Profile Visitors

732 profile views
  1. do an ipconfig command and make sure you have obtained an IP address from your router. make sure you have a gateway set and try to ping it. can the gateway be pinged?
  2. use double quote on each end of the SQL statement when typing in the variable name like this. no ( ) necessary. $name = $_POST['studentName']; $link = db_connect('','',''); $getID_query = "SELECT studentID from student_tbl WHERE firstName=$name"; $result = mysql_query('$getID_query');
  3. maybe you can create a loop to build the table and insert an image that matches the background that will have the values of the X/Y. then save the info in a database or print it out to the screen via echo statement and store value in hidden form element. you can also store values in session variables, or use a GET statement to drop in url, you can also store values in an array. pretty vague I know but maybe it'll get your mind thinking out side the box (pun definitely intended).
  4. alternatively one way you could do this is with virtual desktops where all users remote into their own VM which has a fixed IP, and you deny them all the local stuff via GPO. this way they can remote in via BYOD or company machine. it would also make managing the user VM's more easily.
  5. i find this thread interesting as it makes no sense to me for real world purposes. unless your doing it for the heck of it. so many ways to track & secure users nowadays. this would seem like a nightmare to troubleshoot & manage. most firewalls with AD integration would give you most of their activity on the network.
  6. it would depend on your ability to manage one vs the other. go with the one you feel most comfortable with.
  7. Rebuilding a core part of my network. Biggest thing is adding 10GbE to servers and site links. Basically moving from the lab into production. Very exciting!
  8. you can still put a FW behind your ISP router. the set up isn't ideal but it can be done.
  9. you'd need to clarify what issues you have with each game. any error messages?
  10. Setting up Source addresses is a great way to stop inbound attacks. Also see if your firewall can block TCP & UDP port scans, Host Sweeps, and pings. Not knowing you are there in the first place is a big help. Some additional service you can get from free DNS providers that might have per-defined IP lists of attackers that are automatically updated and blocked both for inbound and outbound traffic. Blocking countries works great too but sometimes when I did that I created issues for some employees trying to email where the email servers we in countries that I blocked.
×