Author Archives: Packet Pushers - The Fat Pipe of Podcasts & Blogs
Author Archives: Packet Pushers - The Fat Pipe of Podcasts & Blogs
SD-WAN startup Versa Networks targets carriers & providers with an emphasis on multitenancy, scalability, and virtual network services.
The post SD-WAN Startup Versa Touts Multitenancy, Scalability To Stand Out appeared first on Packet Pushers.
On this week's show we're chatting with Kevin Finisterre about Silverpush -- the creepy ultrasonic audio-beaconing technology used by advertising companies that was in the press a couple of weeks ago. Kevin was all over it and he joins me to discuss the growing overlap between the techniques used by marketers and blackhats.
Juniper plans to disaggregate its Junos switch OS from the new QFX5200 switches. The QFX5200 line will be the first from Juniper that lets customers choose to run Junos or a third-party network OS. Junos will also run on non-Juniper hardware. Juniper hasn't yet announced third-party partners.
The post Juniper’s Conscious Uncoupling Of Junos & The QFX5200 appeared first on Packet Pushers.
On this week's show we're chatting with Darren Kemp of Duo Security. He's one of the authors of a post about the latest example of computer manufacturer shitware introducing catastrophic vulnerabilities into shipped systems. This time it's Dell's turn.
If you haven't heard what they actually did you'll hardly even believe it. That's this week's feature interview.
In this post we’ll have a look at the process of configuring a FlexVPN network (unofficially known as DMVPN phase 4). I’ll show what components are involved in configuration and how they all tie together. For most patient readers there’s a bonus at the end of this post. FlexVPN network topology The network we’ll be looking at is […]
The post FlexVPN configuration appeared first on Packet Pushers.
In this week's feature interview we're checking in with FireEye's Jonathan Wrolstad. He's a threat intelligence guy at FireEye and they've just published a really interesting report about what a threat group is doing in terms of target recon. They're using marketing company tricks to recon all sorts of high value targets. It's very interesting stuff, and it's likely tied to the Russian state.
Extreme Networks is rolling out new 802.11ac Wave 2 APs. Wave 2 enables greater throughput than Wave 1, and incorporates additional enhancements such as MU-MIMO.
The post Extreme Networks Debuts 802.11ac Wave 2 APs appeared first on Packet Pushers.
On this week's show we're chatting with computer crime lawyer extraordinaire Tor Ekeland! He's worked on a number of high profile CFAA cases. Most recently he's been defending former Reuters and LA Times journalist Matthew Keys on some pretty hefty CFAA charges. He's also the guy who got Andrew Aurenheimer out of jail so he could go and live a free life as a Nazi troll. (Is that really a win?) He also defended Lauri Love... basically if you're a hacker who's fallen foul of the CFAA, this is the guy you want on your team.
Startup Niara applies machine learning to security logs and network packets and flows to find anomalous behavior that may indicate malicious activity.
The post Startup Radar: Niara Uses Machine Learning To Spot Malicious Activity appeared first on Packet Pushers.
Funny enough, much of the food you will find in Yokohama is Chinese, rather than Japanese — another odd fact you probably didn’t need to know. I’m going to cover day 4 and 5 here, as I’m leaving tomorrow morning to head back to the “real world.” Wednesday is a “slow day” in terms of […]
The post IETF Yokohama: Days 4 & 5 appeared first on Packet Pushers.
This week's feature interview is with Troy Hunt of HaveIBeenPwned.com. And he's noticing something pretty weird. It's common for people to deface websites for bragging rights, and yeah, it's not new that data dumps are the new bragging fodder. But it seems like these days attackers are seeing Troy's site as the definitive place to get cred. Now they'll steal a bunch of data and Troy is their first stop.
Life is strange on the internets. That's this week's feature interview.
I'll be live blogging from ONUG for this fall 2015 session. I'm in Manhattan already, looking forward to the event that starts on Wednesday. Refresh this page periodically to see the latest updates as I glean technical data from the presentations in real-time.
The post ONUG Fall 2015 Live Blog – Ethan Banks appeared first on Packet Pushers.
Interesting observation about Japan of the day: when you press the elevator call button, the light over the elevator that will be coming next lights up. When the elevator comes, the light flashes as the doors open. Minor thing, I know, but I’m easily amused. Today I went to the SPRING, or source packet routing […]
The post IETF Yokohama: Day 3 appeared first on Packet Pushers.
I'm in New York City this week to live blog the Open Networking User Group (ONUG) Fall 2015 conference and cover a Tech Field Day Extra.
The post Live Blogging ONUG Fall 2015 Conference appeared first on Packet Pushers.
A list of default TCP port numbers for contemporary applications such as Docker, Elastic, OpenStack and Puppet. Why? Whenever I’m trying to identify an application by port number, the usual online sources are often still giving me details on AltaVista Web Server and the like. In the oh so hip and cutting edge DevOps environments I live […]
The post TCP Port Numbers for Contemporary Applications appeared first on Packet Pushers.
Note to readers: I’m currently at the IETF in Yokohama; each day I’m going to try to post something about the days events y’all might find interesting. I don’t know why, but the faucet knobs in my hotel room seem to rotate backwards. I’m forever turning the water off when I mean to turn it […]
The post IETF Yokohama: Day 2 appeared first on Packet Pushers.
End user WiFi monitoring complements standard network monitoring and can speed up problem detection and troubleshooting. NetBeez shares the top four use cases in wireless monitoring from the user perspective.
The post Four Use Cases for WiFi End User Monitoring appeared first on Packet Pushers.
Note to readers: I’m currently at the IETF in Yokohama; each day I’m going to try to post something about the days events y’all might find interesting. Sunday night — arrived at Yokohama around one in the afternoon after 16+ hours in flight, plus layovers, a one and a half hour bus ride, and then […]
The post IETF: Day 1 appeared first on Packet Pushers.
William Gibson is working at the height of his abilities in The Peripheral. Characters move back and forth between near present-day and an unusual post-apocalyptic future, and the book blends high-tech, visionary showpieces with themes of class, opportunity, and economic injustice.
The post Book Review: ‘The Peripheral’ By William Gibson appeared first on Packet Pushers.
In this week's feature interview we're chatting with Chris Rock from Kustodian. Chris did a great presentation at Ruxcon last week about how easy it is to hack people to death!
He's found out just how easy it is to register births and deaths in the united states and Australia via online systems. He says it's a problem that could result in a virtual baby harvest for fraudsters who plan ahead. It's really fun stuff, that's this week's feature.