Some organizations use Microsoft Proxy to protect their network edge. To pass through the proxy, Microsoft's NTLM authentication/authorization sequence is typicially required. For regular domain users, this is typically not a problem, as Microsoft's Internet Explorer will automatically supply credentials to the Microsoft ISA Proxy Server. Continue reading "Linux Through Microsoft Proxy" »
Thursday, November 16. 2006
Linux Through Microsoft Proxy
Sennheiser HD 600
A little while I was involved in a battle of stereos. I moved into a new apartment, one with kinda thin walls. I was without a music center at the time. My neighbor would play his TV/Stereo/Whatever and I'd hear the bass and side affects. I should have done the right thing and talked to him at that moment. But naah. I decided to play along. I picked up a 6 speaker Logitech system. My neighbor is an early to bed, early to rise sort of guy. But he would go to bed with his system on and let it play through the night. Aargh. I started coming home late at night and turning my system up. Half way through the night, I'd turn my off. He must have turned his down in the meantime as well. We kinda reached a happy medium. Then one day he turned his on at 6 in the morning. That got me to the point of getting on speaking terms with the guy. Continue reading "Sennheiser HD 600" »