The Technology Firm Blog / Networkdatapedia
Tony shares tips, tricks, training, events and news
February 09, 2026
from the web : Why use a route map for redistribution?
The post explains why using a route-map when redistributing routes between protocols (like RIPv2 into OSPF) is important: without one, a router will redistribute all routes indiscriminately, which can cause routing loops, security issues, or unintended route propagation. A route-map gives fine control over which prefixes are shared and allows modification of route attributes such as metrics, metric types, and tags before redistribution. The article walks through a lab topology where RIPv2 routes from one router are selectively redistributed into an OSPF domain using access lists and a route-map that sets different metrics for specific prefixes, demonstrating the configuration and the resulting routing table.
February 05, 2026
Free Seamless Mult-Computer Control with Deskflow
I tried Deskflow, the open-source keyboard and mouse sharing solution that lets you control multiple computers as one. Whether you’re working across Windows, macOS, Linux, or BSD machines, Deskflow turns your primary computer’s keyboard, mouse, and clipboard into a command center for all nearby systems — all without extra hardware or video switching. It’s like having a software KVM that actually simplified my setup, and love that its open source under the GPL-2.0 license.
February 04, 2026
Reserving an IP on a Cudy Router Without Losing Your Mind
If you’ve ever gone hunting for a simple “DHCP Reservation” option on a Cudy router, you’ve probably discovered that Cudy likes to play a little game of hide-and-seek with its terminology. The feature is there, it works well, but it’s not always called what you expect. That’s why reserving an IP on a Cudy router is one of those tasks that feels harder than it should—until you know where to look. Once you crack the language barrier, though, the process is straightforward and incredibly useful.
The big benefit of reserving an IP address is consistency. Devices like printers, servers, or cameras really don’t appreciate surprises, and neither do the apps or computers that talk to them. By reserving an IP, you’re telling your router, “Hey, this device gets this address every time—no exceptions.” In my case, I used an HP DeskJet 2600 as the example in the video, because printers are famous for breaking the moment their IP address changes. One reservation later, and those “printer not found” errors magically disappear.
February 03, 2026
Free Stanford AI course - LLM Evaluation & Scaling
If you’re looking to elevate your understanding of deep learning and neural networks, this YouTube playlist is an invaluable resource you won’t want to miss. Carefully curated to take you from core fundamentals to advanced techniques, this collection of expert-led videos breaks down complex topics into lessons that are easy to follow and rich in insight. Whether you’re a beginner just stepping into the world of AI or a seasoned coder aiming to sharpen your skills, this playlist has something to offer at every level.
What makes this playlist truly stand out is its focus on clarity and depth. Each video takes the time to explain not just how algorithms work, but why they work — giving you a deeper intuition that goes beyond memorization. From learning the mathematical foundations of machine learning to exploring hands-on coding examples and real-world applications, the playlist builds your confidence step by step. The result is a learning journey that feels structured, supportive, and highly informative.
February 02, 2026
From the web: Microsoft Confirms It Can Share Windows 11 BitLocker Keys With Law Enforcement
Microsoft has basically confirmed that it can hand over BitLocker recovery keys to law enforcement if there’s a valid legal request.
Popular post in the past 30 days
-
If you’re ready to build a solid foundation in machine learning, this Machine Learning Fundamentals YouTube playlist is one of the best fre...
-
If you’ve ever opened a capture in Wireshark and immediately felt like you were staring into the Matrix, display filters are your way out....
-
In past articles I covered how to search for HTTP login credentials. After some feedback, I wanted to cover another approach used to find...
-
There’s nothing quite like finishing a hardware install and thinking, “I’ll remember how I set this up.” Spoiler alert: you won’t. That’s ...
-
If you’ve ever written a perfectly reasonable Bash script on Windows, copied it to a Linux box, and been greeted by a mysterious ^M or a “b...