Archive

Category Archives for "Networking"

The Week in Internet News: Connected Hot Tub Lands in Hot Water

Hot tub vulnerabilities: New connections to the Internet of Things for hot tubs – allowing users to do things like adjust water temperature using their smartphones – also may make the products vulnerable to attacks, Naked Security writes. At least one connected hot tub would be easy to attack by a nearby hacker, according to research.

IoT security by BlackBerry: The vintage smartphone maker is rebranding itself as an IoT security vendor, with the release of three products, CNet reports. BlackBerry wants to license its technology to IoT device makers.

It’s a fake fake news study: Researchers who released a study on fake news in mid-2017 have retracted it, saying erroneous data lead to the study’s conclusion, Vice reports. The study had suggested that fake news is as likely to go viral on social media as true information, but the reevaluated data doesn’t support that conclusion, the authors said.

The golden years for fake news: Meanwhile, people over age 65 are likely to share the most fake news on Facebook, The Verge says. That’s the conclusion of researchers from New York University and Princeton University.  Older users shared more fake news than younger ones regardless of education, sex, race, income, Continue reading

Tools: Dropping and Shaping Packets with iptables and tc on Linux

You can drop packets using iptables on a Linux host with some level of randomness. iptables -A INPUT -m statistic --mode random --probability 0.8 -s example.com -p icmp -j DROP I also did not know that Linux has a traffic control tool for packet shaping ‘tc’: tc qdisc change dev eth0 root netem loss 5% […]

The post Tools: Dropping and Shaping Packets with iptables and tc on Linux appeared first on EtherealMind.

What Is Continuous Integration?

In spring 2019 Building Network Automation Solutions course we’ll have Kristian Larsson diving into continuous integration and his virtual networking lab product (you might want to listen to the Software Gone Wild episode we did with him to get a taste of what he’ll be talking about). Christoph Jaggi did a short interview with him starting with the obvious question:

What is CI testing and how does it differ from other testing methods?

CI is short for Continuous Integration and refers to a way of developing software where changes written by individual developers are frequently (or "continuously") integrated together into a master branch/trunk, thus continuous integration.

Read more ...

Vagrant SSH Config Trick

I discovered a nice little trick to make working with Vagrant VMs a little easier by utilizing the openssh config file to define the SSH connection parameters for Vagrant VMs. This post will walk you through getting it setup. For reference the following software will be used in this post. ...

Tech Field Day @ CiscoLive Europe 2019

I am honoured to have been selected as a delegate for Tech Field Day during Cisco Live Europe 2019 in Barcelona!

Cisco Live Europe will take place from the 27th of January until Friday 1st.

I am really looking forward to this opportunity. There are some really great names among the list of delegates that I hope to be interacting with quite a lot, both during and after the event.

I am still to receive the official list of presenters, so I can’t tell you just who all the presenters will be, but im sure the Tech Field Day crew will release that information shortly.

When possible, I will be blogging about the presenters for sure. Also, during the event I will be posting to twitter so stay tuned.

A big thank you to Ben and Tom from Tech Field Day for extending an invitation! I can’t wait!

Until then, take care!

/Kim

https://techfieldday.com/event/cleur19/

The post Tech Field Day @ CiscoLive Europe 2019 appeared first on .

What is Cisco ACI?

Hello World This is an overview of what I think Cisco ACI actually is. It uses some examples from the lab environment to show you how the things look like when you start to work with ACI. There are other articles in the works which will be online soon and which will go in details through the real configuration of ACI and best practices while doing it. What is this Cisco ACI Fabric? Cisco ACI is a datacenter network Fabric. It actually means that it is a networking system of more networking L3 switches that have a modified, next-generation OS

The post What is Cisco ACI? appeared first on How Does Internet Work.

Onward & Upward: Recapping NSX-T in 2018 and Beyond

Overview

 

2018 was a big year for NSX-T Data Center, VMware’s network virtualization platform designed and optimized for application workloads running on both vSphere and non-vSphere environments, container platforms, and public clouds. In addition to supporting core use cases around security, automation, and multi-cloud networking, NSX-T Data Center has continued to expand the capabilities of the platform to include enabling networking and security for emerging use cases around containers and cloud-native applications. To support these use cases and increasingly deliver value to customers, NSX-T Data Center saw new versions released, improvements made to plug-ins, and integrations across an expanding ecosystem. 2018 also saw NSX-T Data Center gain significant momentum in terms of customer adoption, delivering enhanced and new capabilities across all use cases to a quickly growing number of customer deployments.

 

Product Releases, Plug-ins, and Integrations

 

In June, NSX-T Data Center 2.2 was released, bringing with this the ability to manage Microsoft Azure based workloads, referred to as NSX Cloud. The NSX-T Data Center platform was also updated to provide networking and security infrastructure for VMware Cloud on AWS. Other notable capabilities included enhanced data path mode in N-VDS, an improved controller cluster deployment experience, guest Continue reading

First step to becoming a hacker: Linux!

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb, the force behind Hackers-Arise, Linux Basics for Hackers provides everything from basic Linux command line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the process.Why Linux? Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. Linux is transparent and this means that you can learn to manipulate it in ways that are not possible with most OSes. In addition (and undoubtedly for the reason just mentioned), most cybersecurity tools are written to run on Linux.To read this article in full, please click here

First step to becoming a cybersecurity pro: Linux

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from No Starch Press was written with people like you in mind. Authored by OccupyTheWeb, Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali provides everything from basic Linux command-line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the process.Why Linux is important to security Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. Linux is transparent, and that means you can learn to manipulate it in ways that are not possible with most OSes. In addition (and undoubtedly for the reason just mentioned), most cybersecurity tools are written to run on Linux.To read this article in full, please click here

First step to becoming a hacker: Linux!

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from no starch press was written with people like you in mind. Authored by OccupyTheWeb, the force behind Hackers-Arise, Linux Basics for Hackers provides everything from basic Linux command line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the process.Why Linux? Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. Linux is transparent and this means that you can learn to manipulate it in ways that are not possible with most OSes. In addition (and undoubtedly for the reason just mentioned), most cybersecurity tools are written to run on Linux.To read this article in full, please click here

First step to becoming a cybersecurity pro: Linux

If you're contemplating a career in cybersecurity and haven't come up to speed on Linux, now's the time to get ramped up and here's one easy way to do it. This new book from No Starch Press was written with people like you in mind. Authored by OccupyTheWeb, Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali provides everything from basic Linux command-line skills through to scripting, manipulating logging, network scanning, using and abusing system services, and remaining stealthy in the process.Why Linux is important to security Because Linux is open source, tool developers (and you) have a level of access that is unsurpassed. Linux is transparent, and that means you can learn to manipulate it in ways that are not possible with most OSes. In addition (and undoubtedly for the reason just mentioned), most cybersecurity tools are written to run on Linux.To read this article in full, please click here