So I recently entered into the amazing world of 3D printing, my wife bought me an Ultimaker 2+ for my birthday this year! It has been a fascinating experience and a whole can of worms I never even knew existed. I will say, the Ultimaker series is supposed to be the most “plug it in and print” printer out there (or at least among the top in that group) but there was still quite a learning curve and there was a lot of tuning involved.
Day 1 As with most trips, we started by flying out to our starting destination, Denver Colorado. The flight out was mostly uneventful, and we got into Denver on time to go pickup the Bikes we rented from Eagle Rider. We rented some BMW 1200GS bikes to take us on our journey through the Rockies. We rode out of Denver shortly after 5pm first stopping at the auto parts store to pickup tire patch kits and the grocery store for food for the weekend.
This last weekend was quite exciting, made some major progress on building our new deck, but this post isn't really about that, I'll have a whole separate post with pictures, timelapse, etc… once it is done. This post is about watercooled PCs and what happens when they fail! So, sometime between Friday night and Saturday morning, my watercooler failed. The outlet on the pump (all in one type unit so the pump was on the CPU heatsink) broke off, not really sure how, and sprayed a water/glycol (I think?
So At home I like to use Debian, well to be honest I use it anywhere I can, but that is aside from the point here.I recently switched my laptop to Debian (came with Ubuntu, finally had enough of Unity) with Cinnamon as the desktop environment. I happily went along just playing around like normal, enjoying the nice DE, and clean looks. Then one day, I go to install my Java IDE and get rolling on some code.
Wow, it has been some time since I made any posts. I was recently having some issues with the site and it got me on a security kick as of late. On my server that I host this site out of I run a script that parses through the access logs on my Debian box and looks for invalid login attempts, which appear to be dictionary attacks, checking for default logins and common passwords based on the login names they are trying to use.