Packet Pushers - The Fat Pipe of Podcasts & Blogs

Author Archives: Packet Pushers - The Fat Pipe of Podcasts & Blogs

Juniper’s Conscious Uncoupling Of Junos & The QFX5200

Juniper plans to disaggregate its Junos switch OS from the new QFX5200 switches. The QFX5200 line will be the first from Juniper that lets customers choose to run Junos or a third-party network OS. Junos will also run on non-Juniper hardware. Juniper hasn't yet announced third-party partners.

The post Juniper’s Conscious Uncoupling Of Junos & The QFX5200 appeared first on Packet Pushers.

Risky Business #391 — Dell fails hard

On this week's show we're chatting with Darren Kemp of Duo Security. He's one of the authors of a post about the latest example of computer manufacturer shitware introducing catastrophic vulnerabilities into shipped systems. This time it's Dell's turn.

If you haven't heard what they actually did you'll hardly even believe it. That's this week's feature interview.

read more

FlexVPN configuration

In this post we’ll have a look at the process of configuring a FlexVPN network (unofficially known as DMVPN phase 4). I’ll show what components are involved in configuration and how they all tie together. For most patient readers there’s a bonus at the end of this post. FlexVPN network topology The network we’ll be looking at is […]

The post FlexVPN configuration appeared first on Packet Pushers.

Risky Business #390 — Crypto derpery abounds in wake of Paris attacks

In this week's feature interview we're checking in with FireEye's Jonathan Wrolstad. He's a threat intelligence guy at FireEye and they've just published a really interesting report about what a threat group is doing in terms of target recon. They're using marketing company tricks to recon all sorts of high value targets. It's very interesting stuff, and it's likely tied to the Russian state.

read more

Risky Business #389 — US law: CFAA isn’t a bug, it’s a feature!

On this week's show we're chatting with computer crime lawyer extraordinaire Tor Ekeland! He's worked on a number of high profile CFAA cases. Most recently he's been defending former Reuters and LA Times journalist Matthew Keys on some pretty hefty CFAA charges. He's also the guy who got Andrew Aurenheimer out of jail so he could go and live a free life as a Nazi troll. (Is that really a win?) He also defended Lauri Love... basically if you're a hacker who's fallen foul of the CFAA, this is the guy you want on your team.

read more

Risky Business #388 — Cyber shrinkery, IoT shenanigans and guest Troy Hunt

This week's feature interview is with Troy Hunt of HaveIBeenPwned.com. And he's noticing something pretty weird. It's common for people to deface websites for bragging rights, and yeah, it's not new that data dumps are the new bragging fodder. But it seems like these days attackers are seeing Troy's site as the definitive place to get cred. Now they'll steal a bunch of data and Troy is their first stop.

Life is strange on the internets. That's this week's feature interview.

read more

TCP Port Numbers for Contemporary Applications

A list of default TCP port numbers for contemporary applications such as Docker, Elastic, OpenStack and Puppet. Why? Whenever I’m trying to identify an application by port number, the usual online sources are often still giving me details on AltaVista Web Server and the like. In the oh so hip and cutting edge DevOps environments I live […]

The post TCP Port Numbers for Contemporary Applications appeared first on Packet Pushers.

Book Review: ‘The Peripheral’ By William Gibson

William Gibson is working at the height of his abilities in The Peripheral. Characters move back and forth between near present-day and an unusual post-apocalyptic future, and the book blends high-tech, visionary showpieces with themes of class, opportunity, and economic injustice.

The post Book Review: ‘The Peripheral’ By William Gibson appeared first on Packet Pushers.

Risky Business #387 — Hack people to death!

In this week's feature interview we're chatting with Chris Rock from Kustodian. Chris did a great presentation at Ruxcon last week about how easy it is to hack people to death!

He's found out just how easy it is to register births and deaths in the united states and Australia via online systems. He says it's a problem that could result in a virtual baby harvest for fraudsters who plan ahead. It's really fun stuff, that's this week's feature.

read more

1 2 3 5