Archive

Category Archives for "Networking"

Buy More, Save More — This HP Coupon Code Cuts Prices on Business PCs

If you're looking to buy a new business PC, HP is currently offering a "buy more, save more" discount that gets activated at 3 different price points, and using a special code. Configure your new PC to the $599+ price point and apply code BMSM60 to save $60. Or configure to $1,299+ and use code BMSM150 to save $150. Configure to $1,999+ and use code BMSM350 for a whopping $350 off your new PC.  Click the codes just mentioned to learn more, or click right here to review available models, specs, and configurations.To read this article in full, please click here

xdpcap: XDP Packet Capture

xdpcap: XDP Packet Capture

Our servers process a lot of network packets, be it legitimate traffic or large denial of service attacks. To do so efficiently, we’ve embraced eXpress Data Path (XDP), a Linux kernel technology that provides a high performance mechanism for low level packet processing. We’re using it to drop DoS attack packets with L4Drop, and also in our new layer 4 load balancer. But there’s a downside to XDP: because it processes packets before the normal Linux network stack sees them, packets redirected or dropped are invisible to regular debugging tools such as tcpdump.

To address this, we built a tcpdump replacement for XDP, xdpcap. We are open sourcing this tool: the code and documentation are available on GitHub.

xdpcap uses our classic BPF (cBPF) to eBPF or C compiler, cbpfc, which we are also open sourcing: the code and documentation are available on GitHub.

xdpcap: XDP Packet Capture
CC BY 4.0 image by Christoph Müller

Tcpdump provides an easy way to dump specific packets of interest. For example, to capture all IPv4 DNS packets, one could:

$ tcpdump ip and udp port 53

xdpcap reuses the same syntax! xdpcap can write packets to a pcap file:

$ xdpcap /path/to/hook capture.pcap  Continue reading

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities. Cisco Talos security researchers, who discovered DNSpionage in November, this week warned of new exploits and capabilities of the nefarious campaign. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key “The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs,” Talos wrote.   “DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate.”To read this article in full, please click here

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities. Cisco Talos security researchers, who discovered DNSpionage in November, this week warned of new exploits and capabilities of the nefarious campaign. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key “The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs,” Talos wrote.   “DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate.”To read this article in full, please click here

Mentorship and Early Career Development

In this episode of the Network Collective, John Fraizer, Denise Fishburn, and Trey Aspelund join the NC crew to talk about the importance of mentorship and practical advice on how to mentor and be mentored.

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

How data storage will shift to blockchain

If you thought cloud storage was digging in its heels to become the go-to method for storing data, and at the same time grabbing share from own-server, in-house storage, you may be interested to hear that some think both are on the way out. Instead organizations will use blockchain-based storage.Decentralized blockchain-based file storage will be more secure, will make it harder to lose data, and will be cheaper than anything seen before, say organizations actively promoting the slant on encrypted, distributed technology.[ Read also: Why blockchain (might be) coming to an IoT implementation near you ] Storing transactional data in a blockchain China company FileStorm, which describes itself in marketing materials as the first Interplanetary File Storage (IPFS) platform on blockchain, says the key to making it all work is to only store the transactional data in blockchain. The actual data files, such as large video files, are distributed in IPFS.To read this article in full, please click here

How data storage will shift to blockchain

If you thought cloud storage was digging in its heels to become the go-to method for storing data, and at the same time grabbing share from own-server, in-house storage, you may be interested to hear that some think both are on the way out. Instead organizations will use blockchain-based storage.Decentralized blockchain-based file storage will be more secure, will make it harder to lose data, and will be cheaper than anything seen before, say organizations actively promoting the slant on encrypted, distributed technology.[ Read also: Why blockchain (might be) coming to an IoT implementation near you ] Storing transactional data in a blockchain China company FileStorm, which describes itself in marketing materials as the first Interplanetary File Storage (IPFS) platform on blockchain, says the key to making it all work is to only store the transactional data in blockchain. The actual data files, such as large video files, are distributed in IPFS.To read this article in full, please click here

History Of Networking – MIME – Nathaniel Borenstein

Nathaniel Borenstein is credited with being the primary author of MIME, empowering multimedia to be sent via email. In this History of Networking episode Nathaniel joins us to talk about his story and how this protocol came to be.

Nathaniel Borenstein
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – MIME – Nathaniel Borenstein appeared first on Network Collective.

Datanauts 163: Hybrid Cloud DNS Design With AWS Route 53

Why is hybrid cloud DNS with AWS hard? What has AWS recently done to make it better? Should we use the new Route 53 Resolver features? The Datanauts tackles these questions and other cloud DNS issues with guest Matt Adorjan. We also explore Matt's CloudPing utility that measures inter-region latency in AWS.

The post Datanauts 163: Hybrid Cloud DNS Design With AWS Route 53 appeared first on Packet Pushers.

Gartner: IT spending to drop due to falling equipment prices

Gartner has updated its forecasts for IT spending this year with a downward projection, but it's not necessarily due to declining sales. It’s because the strengthening U.S. dollar is driving prices down and undercutting previous predictions.Overall spending is expected to increase by 1.1% over 2018, to $3.79 trillion, down from a prediction of 2.8% growth made in January.“Currency headwinds fueled by the strengthening U.S. dollar have caused us to revise our 2019 IT spending forecast down from the previous quarter,” said John-David Lovelock, research vice president at Gartner, in a statement. “Through the remainder of 2019, the U.S. dollar is expected to trend stronger, while enduring tremendous volatility due to uncertain economic and political environments and trade wars."To read this article in full, please click here

IT spending to drop due to falling equipment prices, Gartner predicts

Gartner has updated its forecasts for IT spending this year with a downward projection, but it's not necessarily due to declining sales. It’s because the strengthening U.S. dollar is driving prices down and undercutting previous predictions.Overall spending is expected to increase by 1.1% over 2018, to $3.79 trillion, down from a prediction of 2.8% growth made in January.“Currency headwinds fueled by the strengthening U.S. dollar have caused us to revise our 2019 IT spending forecast down from the previous quarter,” said John-David Lovelock, research vice president at Gartner, in a statement. “Through the remainder of 2019, the U.S. dollar is expected to trend stronger, while enduring tremendous volatility due to uncertain economic and political environments and trade wars."To read this article in full, please click here

Gartner: IT spending to drop due to falling equipment prices

Gartner has updated its forecasts for IT spending this year with a downward projection, but it's not necessarily due to declining sales. It’s because the strengthening U.S. dollar is driving prices down and undercutting previous predictions.Overall spending is expected to increase by 1.1% over 2018, to $3.79 trillion, down from a prediction of 2.8% growth made in January.“Currency headwinds fueled by the strengthening U.S. dollar have caused us to revise our 2019 IT spending forecast down from the previous quarter,” said John-David Lovelock, research vice president at Gartner, in a statement. “Through the remainder of 2019, the U.S. dollar is expected to trend stronger, while enduring tremendous volatility due to uncertain economic and political environments and trade wars."To read this article in full, please click here

The Internet of Things: Why ‘Trust By Design’ Matters

Kids holding hands on fields

As we have seen vividly in recent years, inadequate security and privacy protections in the Internet of Things (IoT) can have devastating impacts – on Internet users and core infrastructure. The high profile Mirai botnet distributed denial of service (DDoD) attack in 2016 was a dramatic example of the effects of poor security in IoT devices, and CloudPets connected teddy bears were withdrawn from sale by most retailers after it was revealed that millions of voice recordings between parents and their children were exposed. But the threats from these insecure devices don’t vanish when they are updated or recalled, since there is often a large number of them still in service, and still vulnerable.

Because of this, the Internet Society is particularly focused on improving the security and privacy of consumer IoT. As a rapidly growing area, it is especially vulnerable and has been exploited by malicious actors.

That’s why we’re encouraging manufacturers to adopt Trust by Design.

“Trust by Design” – an umbrella term that includes Privacy by Design and Security by Design – is an essential component of a healthy IoT ecosystem. It has significant implications beyond IoT for the health of the Internet as a whole, and Continue reading