Author Archives: Russ
Author Archives: Russ
The post Worth Reading: These words should be banned appeared first on rule 11 reader.
The post Worth Reading: The future of ransomware appeared first on rule 11 reader.
One of the things I hear from time to time is how smaller Internet facing service deployments, with just a few instances, cannot really benefit from anycast. Particularly in the active-active data center use case, where customers can connect to one data center or another, the cost of advertising the service as an anycast, and the resulting requirement to keep the backend databases tightly synchronized, is often played as a eating a lot of complexity for the simplicity of having a single address in the DNS system, and hence not losing customer interaction time while the DNS records are timing out so the customer can reconnect to the service.
There is, in fact, some interesting recent research in this area. The research is directed at the DNS root servers themselves, probably because they are publicly accessible, and a well known system that has relied on anycast for many years (so the operators of the root DNS servers are probably well versed in the ways of anycast). One interesting chart from the post over at APNIC’s blog is—
The C root has 8 servers, while the L root has around 144 (according to the article pointed to above). Why is it Continue reading
The post Worth Reading: Hi gamut monitors appeared first on rule 11 reader.
The post Worth Reading: ISO 27018 for the cloud appeared first on rule 11 reader.
The post Worth Watching: The Impact of Encryption appeared first on rule 11 reader.
The post Worth Reading: A few secrets of successful learning appeared first on rule 11 reader.
The post Worth Reading: Who controls the Internet? appeared first on rule 11 reader.
The post Worth Reading: A better way to compare yourself appeared first on rule 11 reader.
The post Worth Reading: Who pays security costs? appeared first on rule 11 reader.
A good bit has been written about the recent WannaCry outbreak over the last few weeks; rather than stringing the best out through Worth Reading posts, I have collected the three best posts on the topic here.
Over the weekend a cyber attack known as “WannaCry” infected hundreds of computers all over the world with ransomware (malware which encrypts your data until you pay a ransom, usually in Bitcoin). The attack takes advantage of an exploit for Windows known as “EternalBlue” which was in the possession of NSA and, in mid April, was made public by a group known as “The Shadow Brokers.” Microsoft issued a patch for the vulnerability on March 14 for all supported versions of Windows (Vista and Continue reading
The post Worth Reading: The Embiggening Bite of GPUs appeared first on rule 11 reader.
The post Worth Reading: Key logger audio driver appeared first on rule 11 reader.
There has been a lot of chatter recently in the 5G wireless world about network slices. A draft was recently published in the IETF on network slices—draft-gdmb-netslices-intro-and-ps-02. But what, precisely, is a network slice?
Perhaps it is better to begin with a concept most network engineers already know (and love)—a virtual topology. A virtual topology is a set of links, with some subset of connected devices (either virtual or real), that act as a subset of the network. Isn’t such a subset of the network a “slice” if you look at it from a different angle? To ask the question in a different way: how are network slices different from virtual network overlays?
To begin, consider the control plane. In the world of virtual topologies, there is generally one control plane that provides reachability, as well as sorting reachability into each virtual topology. For instance, BGP carries a route target and a route discriminator to indicate which virtual topology any particular destination belongs to. A network slice, by contrast, actually has multiple control planes—one for each slice. There will still be one “supervisor control plane,” of course, much like there is a hypervisor that manages the resources of each Continue reading
The post Worth Reading: Mapping with wifi appeared first on rule 11 reader.
Just like organizations can build up technical debt, so too can they also build up something called “security debt,” if they don’t plan accordingly… In the past, security used to be ignored by pretty much everyone, except banks. But security is more critical than it has ever been because there are so many access points. We’ve entered the era of Internet of Things, where thieves can just hack your fridge to see that you’re not home.
The post Worth Reading: Security debt appeared first on rule 11 reader.