BFIX, the Burkina Faso Internet exchange point, was established as an association in Burkina on February 19, 2015 by Internet Service Providers (ISP), mobile telecommunication operators, and some public institutions such as the University of Ouagadougou and the government agency in charge of promoting information and communication technologies (“Agence de Promotion des Technologies de l’Information et de la Communication – ANPTIC”).
BFIX started exchanging the first bits of data among peers on June 26, 2015, during the 11th edition of the national “Internet Week.” BFIX’s service was officially launched on July 10, 2018 as part of the West Africa Regional Communication Infrastructure Project (WARCIP) – Burkina, among other projects.
Despite the launch and the operationalization of BFIX, a number of challenges remained, mainly attributed to the implementation of IXP best practices. In particular the network design was not optimal. Moving forward, the local community, through the voice of its executive director, Millogo Jean Baptiste, reached out to the Internet Society Africa Regional Bureau for technical assistance. A training session was planned and carried out between the 14th and 18th of January 2019 in Ouagadougou under the Internet Society and Facebook IXP Partnership project.
The one-week training had two Continue reading

I think this is the first time we published a live video recording of podcast
The post Live Podcast Recording – Heavy Networking with Gluware appeared first on EtherealMind.

This is a guest post by Jim “Elwood” O’Gorman, one of the maintainers of Kali Linux. Kali Linux is a Debian based GNU/Linux distribution popular amongst the security research communities.

Kali Linux turned six years old this year!
In this time, Kali has established itself as the de-facto standard open source penetration testing platform. On a quarterly basis, we release updated ISOs for multiple platforms, pre-configured virtual machines, Kali Docker, WSL, Azure, AWS images, tons of ARM devices, Kali NetHunter, and on and on and on. This has lead to Kali being trusted and relied on to always being there for both security professionals and enthusiasts alike.
But that popularity has always led to one complication: How to get Kali to people?
With so many different downloads plus the apt repository, we have to move a lot of data. To accomplish this, we have always relied on our network of first- and third-party mirrors.
The way this works is, we run a master server that pushes out to a number of mirrors. We then pay to host a number of servers that are geographically dispersed and use them as our first-party mirrors. Then, a number of third parties donate Continue reading
The post NetFlow and BGP appeared first on Noction.
I hate listening to “this is what we were doing this year” podcasts as they usually turn into pointless blabbering, self-congratulations and meaningless plans (think New Year resolutions). The Full Stack Journey Episode 28 with Scott Lowe was an amazing deviation from this too-common template.
If you don’t have time to listen to the podcast (but you OUGHT TO do it) here’s what I loved most: “When faced with the onslaught of new technologies, don’t panic. Wait a few months to see which ones survive”.
Read more ...
CEO Nikesh Arora pledged to integrated Twistlock container security and PureSec severless security...
Today's Day Two Cloud episode dives into egress control for cloud security. Guest David Redekop explains why outbound control is essential to protect cloud services, how to use DNS to restrict outbound connections, and the value of logging tools such as OSquery.
The post Day Two Cloud 010: The Role Of Egress Control In Cloud Security appeared first on Packet Pushers.
The latest flaw allows a witty attacker to target API endpoints behind the docker cp command that...
It’s unclear what impact, if any, the outcome of the legal challenge will have on Huawei's...