HTH0014: Back That aaS Up
Alternate episode name candidates:
- I Pee Tables
- A Huge TCPDump
- Back That aaS Up
- Not Always Human or Readable
Boot-Up (Intro…random topics) 00:17
• Combined MFA and Password Reset Registration Now Available• PowerShell Folding
• Dumb Windows bug of the week: If you have too many notifications, you'll stop getting notifications
• State of the Zunion: Steve reviews two Zune AV docks
• Zune 80 Menu Tree if you have a broken screen and need to use it blind:
- Music
- Videos
- Pictures
- Social
- Radio
- Podcasts
- Settings
- -----Wireless
- ----------Wireless: on
- ----------sync now
- ----------Information
- ----------presence: basic
- -----Display
- ----------backlight: 15 seconds
- ----------brightness: medium
- ----------tv out: off
- ----------Background
- -----Music
- -----Pictures
- -----Sounds: on
- -----Touch: off
- -----Radio
- -----Language
- -----about
Pinecraft 24:07
• Docker Minecraft Server• Correction: The best Raspberry Pi 4B has 4GB RAM, not 2GB.
• Porting in worlds and swapping them out
• The guide Steve used to set it up
• docker start minecraft
• docker stop minecraft
Taking a Huge TCPDump 31:43
• Bandwidth issues with CSGO/meetings, but CSGO is the bigger issue• Ran TCPDump on the router to find the largest packets and try to figure out what is going on
•
tcpdump -n -i eth1 -t greater 1000 -c 200 | cut -f 1,2,3,4 -d '.' | sort | uniq -c | sort -nr | head -n 20
• QoS in DD-WRT to play traffic cop
Team up with Teams 35:38
• Breakout Rooms• Private Channels create new Site Collections
• Raise hands in Teams meetings
• Closed Captioning
• Live Translation
• SLAs for changes
○ Policies taking up to 48 hours
I Pee Tables 45:20
• Identifying/Blocking IPs with iptables on DD-WRT• DD-WRT iptables: temporary vs permanent based on NVRAM
• Check if an IP is blacklisted
• Found a GitHub for automatic blocking, compatible with iptables
•
for ip in $(curl --compressed https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1); do iptables -I INPUT -s $ip -j -n DROP; done