Search This Blog


Windows 10 Hardware Temperature Monitoring Tools

Tool to monitor temperature of hardware components in Windows 10

Open Hardware Monitor - portable open source version of hwmonitor

Core Temp - more CPU measurement features


Terminal Ping Sweep

Result: List of IP addresses that respond to ping on the specified prefix
  1. Modify the prefix variable as necessary, and paste into terminal
  2. prefix="192.168.0."
  3. Copy and Paste the rest of the following script into the terminal application
  4. for i in {1..100}
            ping -c1 -W1 -i0.2 $prefix$i > /dev/null
            if [ $? -eq 0 ]
                    echo $prefix$i


Windows cmd ping sweep

Instead of installing a third party application which has the possibility to have spyware or other bad stuff in it. If you only need to do a ping sweep with no additional features it's probably easier just to do it in CMD.
  1. Open up cmd
  2. Run the following
  3. for /L %z in (1,1,254) do @ping 10.0.0.%z -w 10 -n 1 | find "Reply"


  • (1,1,254) indicates to test every address from 1-254
  • 10.0.0. is the network address prefix of addresses you want to test
  • %z is filled in with numbers from (1,1,254)
  • -w 10 - only waits 10ms before moving on
  • -n 1 - only tries once before moving on
  • find "Reply" looks for a succesful ping result and ignores unsuccessful


Scheduling Internet Speed Tests on Synology

SSH into the synology device

Download the following script to whichever directory you like


Allow execute permissions

chmod +x

Create a scheduled task via "Task Scheduler" section in control panel
Run Command should look similar to the following

/bin/python /path_to_script/

For some reason the output doesn't appear in the task scheduler window when the full output is displayed

However, the results are appearing properly in the email notification and when I reduce the amount of output by modifying the script a bit it displays properly as well
python --no-download --simple

You can automatically log the output of any script to a file as well in Task Scheduler.
This can be done by going to the Task Scheduler app, Settings, enabling output recording, and specifying a directory to store output.



Find RAM Population Details

To find out which memory modules have been installed in your machine in Windows

C:\WINDOWS\system32>wmic memorychip list full

Description=Physical Memory
DeviceLocator=DIMM A
Name=Physical Memory
Tag=Physical Memory 0




Places to Play PickleBall in Kitchener Waterloo

The two most popular places I've seen are KW-Badminton Club & RIM Park

KW-Badminton Club
Rackets: You can borrow for free
Price: $5 (or bulk purchase discount)
Location: 69 Agnes Street, Kitchener

RIM Park
Rackets: Borrow for free 3 times
Price: $5 (bulk/age discount)
Location: RIM Park 2001 University Ave. E

Other Places to Play
Alternative: Various YMCA's have pickleball in their schedule (ex. check out A.R. Kaufman Family YMCA)

Where to Buy Rackets:
Location: 55 Erb Street East, Waterloo, ON
Price: Minimum ~$80


F5 Load Balancing

What is a Load Balancer

Beyond making routing decisions a load balancer inspects application traffic rather than just routing information to make forwarding decisions.
Will look at the connection loads of all nodes behind and make an educated choice as to where to forward the packet


Intercept and redirect incoming traffic
ex. redirect to

Provides SSL certification-based authentication and termination
Has an SSL module installed to encrypt and re-encrypt traffic.
This allows some migration of load from the web servers performing the encryption to the F5 load balancer.

Inspect application data and make routing decisions based off of iRules.
Example: You can make it so that all iPad users are redirected to a specific site.

Has packet filters which are similar to access control lists

What is load balancing

When you have multiple network servers as resources responding to client requests made to a virtual IP.

VIP - Primary IP Address for the site
 POOL - Pool is a VIPs resource and has a load balancing algorithm applied

Health checks are applied to pool members to ensure the pool members are in a safe state to redirect traffic to them.

Local Traffic Objects

Network Map - Shows how the VIPs are tied to pools and resources
Virtual Servers - Where all your configuration for your VIPs are stored 
 Profiles - If you want to configure persistence or SSL termination
 iRules - To configure manipulation of application data or payload requests traveling through the LTM
 Pools - The resources for VIPs to group members together
 Nodes - Are the IP addresses of the servers you are going to use
Monitors - Health Checks of Big IP LTM used to determine if a host is in a healthy state
Traffic Class - Allow you to classify traffic based off multitude of criteria 
Address Translation - Allows you to connect to devices not in the same IP space using SNAT

Connection Table

Used to store and manage all of its connections

Two different types of connections: Client Side and Server Side
Client side is external to the Big IP (also referred to the front side or internet facing side or connection initiating side)
Server side is internal

Every connection uses resources and inactive connection purging happens to save system resources


Allows manipulation of server side and client traffic all the way up to the application layer
Parses through the client server headers and looking at payload data to make decisions

A main use of iRules is to perform a redirect whether its a plain URL redirect redirecting one site to another or performing an HTTP to HTTPS redirect.

Event Declaration - Defines the state the connection is currently in
Tcl Code - is executed when the event is matched

SSL Termination

Not only does it relieve some performance of the web servers it also gives the load balancer the ability to see the actual traffic and make routing decisions
SSL Cert and Key are required to terminate SSL connections - added to the load balancer in the form of a profile
Occasionally if policy does not allow server side data to be decrypted the F5 has the ability to re-encrypt data after decryption and inspection


Basic Group Policy Configuration

Group Policy is typically applied to Organizational Units.
Organizational Units have a book icon under "Active Directory Users and Computers"

It is a good idea to separate your Organizational Units into:
  • Computer Policy
  • User Policy
You place user accounts under the Users OU and Computers in the Computer OU

Creating OU's is done by creating and managing users.

You would go to "active directory users and computers" then right click on the domain and click "create ou"

To manage group policy you go:
Start > Administrative Tools > Group Policy Management
You then drill down the forest to the specific domain you're looking for.

Once you find the OU you're looking for you just right click it and press "Create a GPO in this domain, and Link it here"

You then just give it a name and you'll find it under the OU

To configure the group policy you just created:
  1. Expand the OU you created the Policy for
  2. Find the policy you created, right click it, press "Edit"

Computer Configuration - Is applied to the machine when the computer starts up
User Configuration - Is applied when the user logs in
Policies - Are strictly enforced and the users cannot change the preferences specified
Preferences - Are not strictly enforced and the user can change what is specified

All you do then is expand the policies until you find a policy you would like to modify. Once you find it you will have to enable the policy.



Setting IP Address with Network Manager

It seems like most network configuration is now being supported and focused on through network manager.

With that being said it is useful to know how to setup connections using the network manager cli "nmcli"

Delete a Conneciton

First find the connection you want to delete
nmcli con show

[root@beta-spc ~]# nmcli con show
eno2 b92a64bd-d6d4-4df4-bb76-bb3d79906ca6 802-3-ethernet --
eno4 de8b37ac-dfbd-4bae-8b16-10ec27f3f8f2 802-3-ethernet --
eno3 d25d0375-742f-4ad0-9510-7f86c3d5c619 802-3-ethernet --
net-eno1 b2eab8d8-c13b-4822-a202-9892c8676a3b 802-3-ethernet eno1

Then lets delete "net-eno1" so we can add new info for it

nmcli con del b2eab8d8-c13b-4822-a202-9892c8676a3b

Add a new connection

nmcli con add ifname eno1 type ethernet ip4 gw4



Collaborative Playlists

This tutorial describes how to create a playlist that can be shared and collaborated on among youtube users.

  1. Login to
  2. Search a video you would like to add to your playlist
  3. Click the video you would like to add to the playlist
  4. Click the "Add to" button below the video
  5. Click "Create new playlist" button that comes up
  6. Type a name for the playlist you would like to create and then select "Create"
  7. In the top left of the screen locate the drop-down menu and click it
  8. Find the playlist you just created and click it
  9. Go to "Playlist Settings"
  10. Click on the "Collaborate" tab
  11. Flip the switch that says "Collaborators can add videos to this playlist"
  12. Click the "Get link" button
  13. Copy the link and save it somewhere as you will need it to share with all members who you would like to be able to add videos to your playlist
  14. Select the "Save" button
When users open the link you have shared with them it will display the playlist.

They will be able to add videos using the "Add videos" button located on the top right of the playlist

Resources and other playlist sharing options: