Jump to content

AbydosOne

Member
  • Posts

    3,663
  • Joined

  • Last visited

Everything posted by AbydosOne

  1. AbydosOne

    Does having multiple data vdevs with more redun…

    ZFS allows mismatched VDEVs. The VDEVs themselves should be comprised of the same size drives for that reason, but that restriction doesn't apply to pooling VDEVs. Older versions of FreeNAS/TrueNAS would let you pool a single drive into any array, which was a one-way operation. I believe they've "removed" that "feature" since...
  2. I tried to set it up not that long ago and you can't on consumer Windows. You can use a RAID5 array made in Server in Home/Pro, but you can't make a RAID5 in Home/Pro. (Unless you know a way I don't, because I couldn't through Disk Management.)
  3. AbydosOne

    Does having multiple data vdevs with more redun…

    RAIDZ3 can sustain a three disk failure, so in this case you would be fine. But what I think you're asking: no, each VDEV only contains its own data (which is a subset of the full stored data); if you lose a VDEV, you lose the whole pool. This is maybe the one real advantage to pooling VDEVs (I used to do it when I was getting into FreeNAS/TrueNAS/ZFS).
  4. AbydosOne

    Does having multiple data vdevs with more redun…

    RAID-0 (striping), as far as I'm aware. Unless you add additional vdev(s) later, then it sorta balances between them based on how full each vdev is. You can gain some bandwidth, but I think for most "consumer" applications, there's not much to be gained over, say, two 4-wide RAIDZ-1s vs an 8-wide RAID-Z2...
  5. I can't speak to Storage Spaces, but the standard Disk Management RAID-5 is only available on Server builds of Windows.
  6. Some eBay hunting for a 1TB SATA M.2 SSD (long story, I have a motherboard with a SATA-only M.2 slot) found me this gem:

     

    image.png.5bc90aafbd8d76795e00cf67a60b2e79.png

     

    image.png.be82955bf72ac3cb47ee47fc0a03dcfc.png

     

    image.png.4702c60d06d0ec836aee6051028c0f9e.png

     

    Yeah, buddy, not a (legit) Samsung... or NVMe... or M.2...

    1. soldier_ph

      soldier_ph

      Open it up and show us that glorious 64 GB MicroSD Card which probably has WannaCry on it, or at least a Keylogger.

    2. da na

      da na

      Looks like that's been screwed with

  7. TBH, this is a pretty standard rate of emailing for a marketing push, especially when you're trying to "convert" someone who already showed interest. These aren't unsolicited if you started making an account, and they're reminding you to finish it. If you have a problem with those emails, use the unsubscribe link in the email.
  8. I went through three different Windows tablets over a 5-6 year span before I gave up on the concept and bought a convertible laptop. Dell Venue 8 Pro ($200-ish): Win8 on 2GB of RAM was horrible. Screen got really discolored for some reason. Microsoft Surface Pro 2 ($500-ish used): the battery management died so it always reported a full battery. Asus Transformer T102HA ($300-ish): the CMOS battery died, so the clock wouldn't stay synchronized when it went to "sleep".
  9. You can only expand to the "right" in your drive. You'll need to use a disk partitioning software (with a preboot environment) in order to move your Windows install partitions over to the "left" into the unallocated space so you can expand to the "right".
  10. image.png.d2ed95467fd37b0d20e84d43725c8330.png

     

    I... don't know how to answer this... question?

  11. AbydosOne

    XM4 headphones

    I've used my XM4s on Zoom calls on my laptop without issues... you should be able to change the audio and microphone inputs away from the "headset" settings to the other options.
  12. Use \\[IP address]\Share Drive\ instead of \\TV-PC\Share Drive\. Sometimes the local domain names don't get registered properly with your gateway, so IPs are the foolproof method.
  13. Well, I'll be... IT got back to me... They actually just dictionary/brute-forced it. That's actually kinda neat.
  14. This is different scenario than we're discussing. If a bad actor had direct access to the server, we can surmise that encryption keys are either known or bypassed. If I send encrypted plaintext of my password, bad actor now knows my plaintext password. If I send encrypted hash of my password, bad actor knows my hash, but not the text. Either way, they can (in theory) use that password/hash to authenticate my account on this particular authentication system. The utility of knowing a password is to try it on different authentication systems. Assuming competent authentication design, the hashes will be salted to a particular application and submitting them to a different one will not result in a valid authentication (not saying there aren't incompetent ones out there). My presumption is that AD servers store that password as a salted hash, and only ever receive a salted hash from the client via encrypted (TLS/SSL) channel (which seems logical, right?). So how does IT (functionally existing at the "direct access to server" point) know enough about the contents of my password for it to not pass audit if the plaintext is never sent to the AD server and (presumably) they didn't spend the time to brute-force unhash everyone's passwords?
  15. Encryption keys can be stolen; hash functions need to be brute-forced (there are some optimizations, which is why salting exists, but there's no universal reverse function by definition).
  16. Hash algorithms are deterministic? If I hash my password or the AD server hashes my password, it's still the same hash... so why send encrypted-but-plaintext password when you could send encrypted-and-hashed password? Why have a remote cleartext step at all? All the server needs to do is compare the hashes, it doesn't need to know the original password string, right? Seems like a massive security hole to have cleartext passwords in RAM outside the client PC.
  17. My understanding of password validation is that they compare the "encrypted"/hashed values. Passwords shouldn't ever be "decrypted", I'm pretty sure, especially if the "encryption" is a hash algorithm that is computationally very expensive to reverse.
  18. Nothing that runs before login, that I'm aware of. Obviously they have third-party permissions management, but I don't think it's low-level enough to get into the login process. Well that's not sketchy at all... maybe I should stop writing posts from my work computer lol
  19. Yeah, this was the part that stands out. I haven't changed it since last June, and it didn't flag it then, so somehow they're accessing it in plaintext after the fact. I emailed them back, just to see if someone would reach out to me about it (I doubt they will).
  20. Lately, my corporate IT has taken it upon itself to "audit" our passwords and declare any as "being vulnerable to modern hacking techniques" (i.e. contain personally relevant strings, like, say, address number) needing to be changed. I know exactly why my password doesn't pass muster (though work is the only place I use it, so IMO it's not that vulnerable, I'm just stubborn and our IT is notoriously not-competent), I'm just a little incensed that somehow IT can view passwords in plaintext!? Does Active Directory not store hashed passwords? Is there a hashing algorithm that can extract substrings for comparison? 1 Or is IT really so hypocritical as to actually store/unencrypt passwords in plaintext somewhere and then tell *us* to be more secure? 1 = The only way I could think this would be possible would be that the "hash" of the password would actually be a collection of hashes of various substrings when it's made, but I can't find an evidence that this is true.
  21. Hire an electrician before you hurt someone. There's no shame in admitting you don't know, and a bruised ego is better than a smoldering pile of ash.
  22. AbydosOne

    Having to fire up a Windows 98 PC so that I can…

    There's a standalone program out there that will do it. IDR what it's called though.
  23. Sounds like there's a short in the laptop and the brick is shutting down to prevent damage.
×