Archive

Category Archives for "Networking"

Research; HTTPS Interceptions

I have written elsewhere about the problems with the “little green lock” shown by browsers to indicate a web page (or site) is secure. In that article, I considered the problem of freely available certificates, and a hole in the way browsers load pages. In March of 2017, another paper was published documenting another problem with the “green lock” paradigm—the impact of HTTPS interception. In theory, a successful HTTPS session means the session between host and the server has been encrypted, which means no third party can read the contents of the packets passing between the two.

This works, modulo the trustworthiness of the certificates involved in encrypting the traffic, so long as there is no-one in the middle of the connection encrypting packets from the receiver, and re-encrypting them towards the transmitter. This “man in the middle,” or MITM, can read the contents of all the packets in the exchange, even though the data is encrypted on transmit. Surely such MITM situations are rare, right?

Right.

The researchers in this paper set out to discover just how often HTTPS (LTS) sessions are terminated and re-encrypted by some device or piece of software in the middle. To discover how often Continue reading

IDG Contributor Network: Are you winning the data intelligence game?

When big data was hyped as the next technology set to transform the business world many organizations began to collect as much of it as they could lay their hands on. Data centers proliferated as companies sucked in data points from customer interactions, supply chain partners, mobile devices and many, many other sources.It looked as though enterprises had jumped on board with the idea of big data, but what they were actually doing was hoarding information. Very few had any idea about how to unlock the insights contained within. Businesses that saw the value and pioneered analytics are beginning to see a major return on their investment.In a global, cross-industry McKinsey survey of 530 C-level execs and senior managers, almost half said that data and analytics have significantly or fundamentally changed business practices in their sales and marketing functions, and more than a third said the same about R&D. Big data can have a major beneficial impact, but realizing those potential benefits requires a winning strategy.To read this article in full, please click here

IDG Contributor Network: Are you winning the data intelligence game?

When big data was hyped as the next technology set to transform the business world many organizations began to collect as much of it as they could lay their hands on. Data centers proliferated as companies sucked in data points from customer interactions, supply chain partners, mobile devices and many, many other sources.It looked as though enterprises had jumped on board with the idea of big data, but what they were actually doing was hoarding information. Very few had any idea about how to unlock the insights contained within. Businesses that saw the value and pioneered analytics are beginning to see a major return on their investment.In a global, cross-industry McKinsey survey of 530 C-level execs and senior managers, almost half said that data and analytics have significantly or fundamentally changed business practices in their sales and marketing functions, and more than a third said the same about R&D. Big data can have a major beneficial impact, but realizing those potential benefits requires a winning strategy.To read this article in full, please click here

Buenos Aires as a center of discussions on Internet Governance

Without a doubt, this will be a busy week for the Internet Society in Latin America and the Caribbean! Various activities will take place alongside the 11th edition of LACIGF, including discussions on gender and youth, as well as the Workshop for Chapter Leaders of the region. As usual, ISOC will have an important presence in several activities.

LACIGF 11: the maturity of the regional space

From July 31 to August 2, the regional community will meet in Buenos Aires to celebrate the 11th edition of the Regional Preparatory Meeting for the Internet Governance Forum (LACIGF). More than ten years after the first meeting took place, LACIGF is now an established event of high importance, where issues related to Internet Governance in Latin America and the Caribbean are discussed.

The agenda includes diverse topics, in which ISOC will be participate. Raquel Gatto will join the discussions on personal data protection, in addition to co-organizing the session on National and Regional Internet Governance Initiatives. In addition, Sebastián Bellagamba will join the debate around Community Networks. And let’s not forget about the keynote speech that will be given by Raúl Echeberría about the future of the global IGF.

The event will be Continue reading

Cloud computing just had another kick-ass quarter

If you’ve been around the tech industry long enough, recent market events held an eerie familiarity.When Facebook badly missed its numbers for the quarter ended June 30, 2018, the company’s stock took an unprecedented pummeling, losing 20 percent of its value and tanking many other tech stock along with it. Watching the carnage, it was hard not to think back to the spring of 2000 when Microsoft lost its antitrust case, losing 15 percent of its value in a single day and signaling the end of the dot.com boom and the beginning of a historic bust.But something is different this time.To read this article in full, please click here

Cloud computing just had another kick-ass quarter

If you’ve been around the tech industry long enough, recent market events held an eerie familiarity.When Facebook badly missed its numbers for the quarter ended June 30, 2018, the company’s stock took an unprecedented pummeling, losing 20 percent of its value and tanking many other tech stock along with it. Watching the carnage, it was hard not to think back to the spring of 2000 when Microsoft lost its antitrust case, losing 15 percent of its value in a single day and signaling the end of the dot.com boom and the beginning of a historic bust.But something is different this time.To read this article in full, please click here

The Week in Internet News: Facial Recognition IDs Politicians as Criminals

You look like a criminal: Amazon.com’s facial recognition technology falsely flagged 28 U.S. lawmakers as criminals in a test run by the American Civil Liberties Union, The Guardian reports. Whoops! Five members of Congress have demanded an explanation from Amazon, CNET says.

Amazon instead of libraries? It was a bit of a weird week for Amazon. After a Forbes article – since pulled from the website – suggested the giant retailer should replace libraries, the Internet went nuts, not in a good way. The Daily Dot looks at the controversy.

AI as the terminator: Billionaire businessman Mark Cuban has joined the ranks of luminaries warning about the dangers of Artificial Intelligence. “If you don’t think by the time most of you are in your mid-40s that a Terminator will appear, you’re crazy,” he said at a gathering of conservative high school students. CNBC.com has the details of his speech.

AI as a money saver: Meanwhile, AI backers say the technology can bring huge benefits. London’s Metropolitan Police Service could save £30 million and put 545 officers on the streets by using AI to analyze large volumes of data and cross-reference information from databases and surveillance systems, according Continue reading

NS1’s Private DNS enables modern applications, DevOps and more

We all know and appreciate DNS as the domain name system that maps names like Networkworld.com to the IP address that a browser actually connects to in order to get content from a website. DNS is obviously a foundational piece of the internet. However, the technology is a bit stale and needs a refresh to keep up with the times.Legacy DNS is a simple protocol. It is essentially a phonebook that maps a domain name to an IP address. Most commercial DNS products or services in the market today are based on an open-source software product called BIND put out by the Internet Software Consortium. The name BIND stands for “Berkeley Internet Name Daemon” because the software originated in the early 1980s at the University of California at Berkeley. Not much about the DNS protocol has changed since then.To read this article in full, please click here

NS1’s Private DNS enables modern applications, DevOps and more

We all know and appreciate DNS as the domain name system that maps names like Networkworld.com to the IP address that a browser actually connects to in order to get content from a website. DNS is obviously a foundational piece of the internet. However, the technology is a bit stale and needs a refresh to keep up with the times.Legacy DNS is a simple protocol. It is essentially a phonebook that maps a domain name to an IP address. Most commercial DNS products or services in the market today are based on an open-source software product called BIND put out by the Internet Software Consortium. The name BIND stands for “Berkeley Internet Name Daemon” because the software originated in the early 1980s at the University of California at Berkeley. Not much about the DNS protocol has changed since then.To read this article in full, please click here

Linux Must for Network Engineers !!!!

Linux once used to be strict NO for Network engineer, we as network engineer always preferred to be comfortable with windows. But time has changed now ,Linux is everywhere starting from mobile device ,computers, servers, Hypervisor, network switches . Most of the network devices operating system is based on Linux.

Few important reason for network engineers to Learns Linux :-

  • Mostly open source projects (open stack, Docker etc. )tools are based on Linux which we as network engineers have to use.
  • Network devices are now having Linux as underlying shell.
  • Most of the software which are directly or indirectly related to networks are using development environment as Linux.

So lets start with basics of Linux which can help us in our day to day task:-

 

Sudo 

  • “Super user do” command is used to gain root privilege.Dollar sign($) signifies user does not have root privilege.Hash sign(#) signifies user have root privilege.

Pwd

  • Print working directory.

ls

  • List content of directory.

Man  <Command>

  • List manual pages of command

Cd..

  • Change current directory to parent directory

cd

  • Back to home directory

Cd ../..

  • Back two directory

Cd..

  • Moves back to previous working directory

Mkdir

  • makes new director

Mkdir -p