April 30, 2026
From Wires to Wi-Fi: A Laid-Back Look at How the Internet Grew Up
This issue of The Internet Protocol Journal (Vol. 29, No. 1) is a really enjoyable read if you’re into how the Internet became what it is today. Geoff Huston’s Internet Evolution article does most of the heavy lifting, but in a way that doesn’t feel overly academic. It walks through everything from the early days of slow terminals and simple networks to the massive, high-speed systems we rely on now. The way it ties Moore’s Law into all of this makes it easy to see why things scaled so quickly—and why the Internet feels so different compared to even a couple of decades ago.
April 28, 2026
Survey Says: Your Wi-Fi Might Be Lying to You 📡
This Ekahau webcast dives into one of the most overlooked truths in networking: designing Wi-Fi is only half the battle—proving it works in the real world is where the magic (and mistakes) happen. The session breaks down how accurate site surveys act as the “scientific method” of wireless networking, validating designs against real-world conditions and ensuring performance before deployment or major changes. From pre-deployment checks to ongoing health validation, the webinar emphasizes that skipping this step is basically gambling with your network’s reliability.
April 27, 2026
Microsoft Powershell Desktop Network Troubleshoting Tip
If you’ve ever found yourself digging through layers of network settings just to answer a simple question like “what’s my IP?”, PowerShell’s
Get-NetIPConfiguration feels like a breath of fresh air. This command pulls together all your key network details—IP address, default gateway, DNS servers, and interface information—into one clean, readable snapshot. Instead of hopping between GUI windows or juggling multiple commands like ipconfig, you get everything in one place, formatted in a way that actually makes sense.
April 23, 2026
Frameworks vs. Libraries: The Python Power Struggle Every Developer Should Understand
April 22, 2026
IPv8: The Internet’s Bold Reinvention… or Just Another Layer of Ambition?
The article from The Network DNA blog dives headfirst into one of the most intriguing networking proposals in years—Internet Protocol Version 8. At its core, the piece presents IPv8 as a sweeping reimagining of the internet’s foundation, not just another incremental upgrade. Rather than simply expanding address space like IPv6, IPv8 attempts to solve deeper structural problems: fragmented network management, bloated routing tables, and inconsistent security. The blog does a strong job translating a dense technical draft into something readable, walking through the motivation behind IPv8 while highlighting its most ambitious promise—a unified, tightly integrated protocol ecosystem.
April 21, 2026
Sniff Smarter, Not Harder: Why Wireshark Preferences Are Your Secret Weapon
Before you even think about hitting that capture button in Wireshark, spending time in Edit → Preferences is one of the smartest moves you can make. Out of the box, Wireshark is powerful—but it’s also generic. Every network is different, every investigation has a purpose, and default settings rarely align perfectly with your environment. By configuring preferences first, you’re essentially tuning Wireshark to your network, which means cleaner captures, better visibility, and less time wasted digging through irrelevant data.
One of the biggest advantages of tweaking preferences early is improved capture and file management. Wireshark relies heavily on heuristics and default port assumptions to identify traffic.
April 20, 2026
Making the most of Lab work
Management imagine technicians tossing paper balls into the trash can, gaming and generally goofing off during this time. I should know because I was in management and have actually seen this exact scenario play out. It only takes one time to ruin for everyone asking after you.
Do yourself and your boss a favor and try to take a more organized approach to requesting and reporting on your lab work.
April 17, 2026
Now for a little fun.. lovemytool is alive!!
Big news in the lab, folks: the legendary LoveMyTool name is back in action! After years of living under the slightly more buttoned-up banner of The Tech Firm Blog, we’ve decided it was time to bring back a name with a little more personality… and let’s be honest, a lot more attitude. Because nothing says “serious technical insights” quite like a name that also sounds like it belongs on a novelty coffee mug.
This revival wouldn’t have happened without the generosity of Tim O’Neil, who kindly handed over the lovemytool.com name so it could live again. That means if you punch in www.lovemytool.com , you’ll land right here at https://thetechfirmblog.blogspot.com great content, same questionable humor, just with a name that feels like it’s wearing a Hawaiian shirt instead of a suit and tie.
For longtime readers, this is a bit of a homecoming. The original LoveMyTool blog built its reputation on mixing solid technical know-how with a wink and a nudge, and plenty of you have made it clear that the name was half the fun. So consider this the best of both worlds: the same blog you’ve been reading, now rebranded with a name that reminds us not to take ourselves too seriously—even when we’re deep in packet captures or arguing with firmware. Welcome back to LoveMyTool.
Yes, I missed it too.
April 16, 2026
What Caused the Microsoft Developer Account Lockout?
The Microsoft developer account lockout incident described in the article highlights how several major open-source security tools—including VeraCrypt, WireGuard, and Windscribe—were suddenly cut off from distributing updates to Windows users. According to the report, developers found their accounts suspended without warning, preventing them from signing drivers or releasing patches. Because Windows requires signed drivers for installation, this effectively froze updates for tens of millions of users, leaving them potentially exposed to unpatched vulnerabilities. ([Aardwolf Security][1])
The root cause appears tied to Microsoft’s Windows Hardware Program and its mandatory identity verification requirements. Developers were expected to submit government-issued identification within a set timeframe, but several affected maintainers they never received proper notification—or even completed verification without regaining access.
April 15, 2026
How to Solve the Four Most Common Problems with PoE++ Devices (Julio Petrovitch)
In 2018, the IEEE 802.3bt (PoE++) standard for Power Over Ethernet was approved. It offered more power, allowing devices like high-powered security cameras to be run on PoE. Which is great – until the installer uses the wrong cable to connect a camera and can’t figure out why it won’t power on.
Having multiple standards makes
troubleshooting PoE issues more complicated. For example, many field technicians
or network engineers don’t realize that upgrading to new pan-tilt-zoom cameras
or to Wi-Fi 7 access points with multiple radios will require a PoE upgrade as
well. As offices and warehouses deploy more smart devices that need PoE++, testing
becomes more important. This article will explain the PoE++ standard, best
practices in PoE deployment and testing, and how to solve several common
problems.
What is the PoE++ Standard?
April 14, 2026
ATM Jackpot for Hackers: Inside the $3.6M Bitcoin Depot Breach
The recent breach of Bitcoin Depot highlights yet another reminder that in the world of cryptocurrency, the weakest link often isn’t the blockchain—it’s everything around it. According to the report, attackers infiltrated the company’s internal IT systems on March 23, 2026, and managed to steal over 50 Bitcoin, valued at roughly $3.6 million. U.S. Securities and Exchange Commission filings revealed the hackers gained access to sensitive credentials tied to digital asset settlement accounts, allowing them to transfer funds before the breach was contained. (BleepingComputer)
April 13, 2026
Switch Reporting Mystery Solved
For those of you who have read my past articles, I have said countless times that you should "Know your tools". Over the years, I find a lot of examples of this simple statement. Funny thing is how many times people just shrug their shoulders and say "oh well"...
A few weeks ago, while troubleshooting, I noticed something odd. There were multiple mac/ip entries for individual switch ports.
April 09, 2026
🧠 DHCP Logs Decoded: The Tiny Tool That Packs a Networking Punch
When it comes to digging through messy Windows DHCP logs, DHCP Log Viewer from NirSoft is one of those hidden gems that quietly makes your life a whole lot easier. This lightweight, no-install utility takes the chaos of raw DHCP audit logs and turns it into something you can actually read—without needing PowerShell wizardry or endless scrolling through text files. If you’ve ever tried troubleshooting IP conflicts or lease issues using default Windows tools, you’ll instantly appreciate what this tool brings to the table. https://www.nirsoft.net/utils/dhcp_log_view.html
April 08, 2026
Certification vs. Qualification vs. Bit Rate Testing: What’s the Difference?
Picture this: You plug in a cable. The link
light on the switch turns green. You ping the device, and it replies. You walk
away thinking, "Job done."
But a week later, the camera goes offline
intermittently, or the access point drops clients when traffic spikes. Why?
Because a simple link light only tells you there is electrical continuity. It
doesn't tell you if the cable can actually handle sustained data load.
April 07, 2026
Wi-Fi 7 vs Wi-Fi 6: The Network Smackdown You Didn’t Know You Needed
Let’s face it: Wi-Fi technology reads like alphabet soup most of the time, but the folks at The Network DNA take a fun (and gently sarcastic) jab at the Wi-Fi 6 vs Wi-Fi 7 debate in their comparison article. The piece starts by reminding us that Wi-Fi standards evolve faster than your last smartphone upgrade cycle — Wi-Fi 6 was a big deal when it launched, and now Wi-Fi 7 is here to make it feel like ancient history. They walk through the basics so that even your tech-averse cousin could nod along without glazing over.
In the next section, the article digs into how each standard actually performs. Think of Wi-Fi 6 as a sprinter who’s fast and efficient, handling crowded networks like a champ, while Wi-Fi 7 shows up with rollerblades, a jetpack, and probably a cape. The newer standard boosts theoretical speeds dramatically and has clever features like improved channel bandwidth and simultaneous multi-band connections that make your devices feel they’re on a super-highway rather than a congested city street.
April 06, 2026
Another $25 Amazon card is up for grabs
Go to https://giveaway.thetechfirm.com for rules and to submit your ballot or ballots ;)
Quite a few people weren't followers or on the email list, so double check.
Draw date is May 1, 2026
Why ???
I have done countless videos about how important it is to supervise and check on your cabling contractors.
In this example, the team and I are wondering why the contractor decided to route this cable up into the ceiling and hang the drops. Yes, we provided specific install instructions...
There will be no projector or access point here. Its a break room and we wanted a few drops for a phone, smart TV and 2 extras.
April 04, 2026
Did you have a Science Fair 150-in-1 Electronic Project Kit growing up ? I did...
This vintage item is the Science Fair 150-in-1 Electronic Project Kit. Released in 1976 by Radio Shack (Tandy Corp), it was a popular educational tool designed for children aged 8 and up to explore basic electronics and electricity.
April 02, 2026
🔐 Lock It Down Like a Pro: The Ultimate Cisco IOS XE Hardening Playbook
When it comes to securing your network, leaving your devices in their default state is basically rolling out the red carpet for attackers. This guide from The Network DNA dives deep into hardening Cisco IOS XE devices, walking through the critical steps every network admin should take to reduce vulnerabilities and tighten control. With threats constantly evolving—and real-world exploits targeting IOS XE services like web interfaces and management planes —this isn’t optional anymore; it’s essential.
At its core, the article emphasizes a layered security approach across the management, control, and data planes. That means locking down access with AAA, disabling unused services, enforcing strong password policies, and ensuring secure management protocols like SSHv2 are used instead of legacy options. These best practices align with long-standing Cisco hardening guidance, which highlights securing access, encrypting communications, and limiting exposure as foundational defenses .
The guide also digs into service and protocol hardening—one of the most overlooked areas. This includes disabling insecure protocols (like Telnet or older TLS versions), tightening SNMP configurations, and removing weak cryptographic ciphers. Even seemingly minor misconfigurations—like leaving outdated SSH settings enabled—can create major attack surfaces, making it critical to modernize crypto settings and keep IOS XE versions up to date .
Finally, the article reinforces the importance of continuous monitoring and maintenance. Hardening isn’t a “set it and forget it” task—it requires regular audits, log analysis, patching, and reviewing Cisco security advisories. With new vulnerabilities surfacing regularly, staying proactive ensures your network devices remain resilient, not just configured securely on day one.
Click here or the image above to read the full article
April 01, 2026
Why Should I Bother With A Site Audit
After working this contract for over a year, I feel like I've got a pretty good idea of the current equipment, installation standards, some of the exceptions and some of the chronic issues support staff face. I even had the opportunity to visit a few sites to see the office culture, politics and equipment limitations that we have to work with.
Even though the bulk of the installations were done around the same time period with some really good installation standards like what goes to what port, IP addressing standards, etc.. things change over the years for a multitude of reasons:
- replacing equipment due to upgrades or failure
Popular post in the past 30 days
-
If your network toolkit depends on Wireshark — and chances are it does — a critical new security update demands your immediate attention. Wi...
-
In 2018, the I EEE 802.3bt (PoE++) standard for Power Over Ethernet was approved. It offered more power, allowing devices like high-powered ...
-
To celebrate my 10th year on youtube and to thank all those who watch, like, share and subscribe i wanted to give you a gift. 2 years ago...
-
The recent breach of Bitcoin Depot highlights yet another reminder that in the world of cryptocurrency, the weakest link often isn’t the blo...
-
Thanks for the the positive feedback and comments people sent about the first Wireshark class post... Some long time Wireshark users comme...

