Archive

Category Archives for "Networking"

The History of Stock Quotes

The History of Stock Quotes

In honor of all the fervor around Bitcoin, we thought it would be fun to revisit the role finance has had in the history of technology even before the Internet came around. This was adapted from a post which originally appeared on the Eager blog.

On 10th of April 1814, almost one hundred thousand troops fought the battle of Toulouse in Southern France. The war had ended on April 6th. Messengers delivering news of Napoleon Is abdication and the end of the war wouldn’t reach Toulouse until April 12th.

The issue was not the lack of a rapid communication system in France, it just hadn’t expanded far enough yet. France had an elaborate semaphore system. Arranged all around the French countryside were buildings with mechanical flags which could be rotated to transmit specific characters to the next station in line. When the following station showed the same flag positions as this one, you knew the letter was acknowledged, and you could show the next character. This system allowed roughly one character to be transmitted per minute, with the start of a message moving down the line at almost 900 miles per hour. It wouldn’t expand to Toulouse until 1834 however, Continue reading

The History of Stock Quotes

The History of Stock Quotes

In honor of all the fervor around Bitcoin, we thought it would be fun to revisit the role finance has had in the history of technology even before the Internet came around. This was adapted from a post which originally appeared on the Eager blog.

On 10th of April 1814, almost one hundred thousand troops fought the battle of Toulouse in Southern France. The war had ended on April 6th. Messengers delivering news of Napoleon Is abdication and the end of the war wouldn’t reach Toulouse until April 12th.

The issue was not the lack of a rapid communication system in France, it just hadn’t expanded far enough yet. France had an elaborate semaphore system. Arranged all around the French countryside were buildings with mechanical flags which could be rotated to transmit specific characters to the next station in line. When the following station showed the same flag positions as this one, you knew the letter was acknowledged, and you could show the next character. This system allowed roughly one character to be transmitted per minute, with the start of a message moving down the line at almost 900 miles per hour. It wouldn’t expand to Toulouse until 1834 however, Continue reading

Simple Cyber Security Tips (for your Parents)

Simple Cyber Security Tips (for your Parents)

Today, December 25th, Cloudflare offices around the world are taking a break. From San Francisco to London and Singapore; engineers have retreated home for the holidays (albeit with those engineers on-call closely monitoring their mobile phones).

Whilst our Support and SRE teams operated on a schedule to ensure fingers were on keyboards; on Saturday, I headed out of the London bound for the Warwickshire countryside. Away from the barracks of the London tech scene, it didn't take long for the following conversation to happen:

  • Family member: "So what do you do nowadays?"
  • Me: "I work in Cyber Security."
  • Family member: "There seems to be a new cyber attack every day on the news! What can I possibly do to keep myself safe?"

If you work in the tech industry, you may find a family member asking you for advice on cybersecurity. This blog post will hopefully save you Continue reading

Simple Cyber Security Tips (for your Parents)

Simple Cyber Security Tips (for your Parents)

Today, December 25th, Cloudflare offices around the world are taking a break. From San Francisco to London and Singapore; engineers have retreated home for the holidays (albeit with those engineers on-call closely monitoring their mobile phones).

Whilst our Support and SRE teams operated on a schedule to ensure fingers were on keyboards; on Saturday, I headed out of the London bound for the Warwickshire countryside. Away from the barracks of the London tech scene, it didn't take long for the following conversation to happen:

  • Family member: "So what do you do nowadays?"
  • Me: "I work in Cyber Security."
  • Family member: "There seems to be a new cyber attack every day on the news! What can I possibly do to keep myself safe?"

If you work in the tech industry, you may find a family member asking you for advice on cybersecurity. This blog post will hopefully save you Continue reading

Top 5 Blogs of 2017 – Build and run your first Docker Windows Server container

As 2017 comes to a close, we looked back at the top five blogs that were most popular with our readers. For those of you that have yet to set up your first Docker Windows container, we are kicking off the week with a blog that will help you get up and running on Windows containers.


Earlier this year, Microsoft announced the general availability of Windows Server 2016, and with it, Docker engine running containers natively on Windows. This blog post describes how to get setup to run Docker Windows Containers on Windows 10 or using a Windows Server 2016 VM. Check out the companion blog posts on the technical improvements that have made Docker containers on Windows possible and the post announcing the Docker Inc. and Microsoft partnership.

Before getting started, It’s important to understand that Windows Containers run Windows executables compiled for the Windows Server kernel and userland (either windowsservercore or nanoserver). To build and run Windows containers, a Windows system with container support is required.

Windows 10 with Anniversary Update

For developers, Windows 10 is a great place to run Docker Windows containers and containerization support was added to the the Windows 10 kernel with the Anniversary Continue reading

General – Merry Christmas And A Little Gift

Hi all,

I had some issues with the site and I haven’t blogged as much lately as I would have hoped but I wanted to wish you a Merry Christmas and send you a little gift from Martin Duggan.

Martin recently released part two of his CCDE Practical Scenarios. Like the last time he is giving you, my readers a discount when you buy it from Leanpub. It’s a really good scenario and you have to stay focused and do your best even if you are not comfortable with the scenario. This is very much how the real scenarios are. You may not be comfortable working with say a cable provider but that might be the scenario you are given. Focus on what is important and find the requirements and constraints and answer as best you can.

Follow this link to receive a discount on the scenario.

Merry Christmas!

The post General – Merry Christmas And A Little Gift appeared first on Daniels Networking Blog.

TLS 1.3 is going to save us all, and other reasons why IoT is still insecure

TLS 1.3 is going to save us all, and other reasons why IoT is still insecure

As I’m writing this, four DDoS attacks are ongoing and being automatically mitigated by Gatebot. Cloudflare’s job is to get attacked. Our network gets attacked constantly.

Around the fall of 2016, we started seeing DDoS attacks that looked a little different than usual. One attack we saw around that time had traffic coming from 52,467 unique IP addresses. The clients weren’t servers or desktop computers; when we tried to connect to the clients over port 80, we got the login pages to CCTV cameras.

Obviously it’s important to lock down IoT devices so that they can’t be co-opted into evil botnet armies, but when we talk to some IoT developers, we hear a few concerning security patterns. We’ll dive into two problematic areas and their solutions: software updates and TLS.

The Trouble With Updates

With PCs, the end user is ultimately responsible for securing their devices. People understand that they need to update their computers and phones. Just 4 months after Apple released iOS 10, it was installed on 76% of active devices.

People just don’t know that they are supposed to update IoT things like they are supposed to update their computers because they’ve never had to update things Continue reading

TLS 1.3 is going to save us all, and other reasons why IoT is still insecure

TLS 1.3 is going to save us all, and other reasons why IoT is still insecure

As I’m writing this, four DDoS attacks are ongoing and being automatically mitigated by Gatebot. Cloudflare’s job is to get attacked. Our network gets attacked constantly.

Around the fall of 2016, we started seeing DDoS attacks that looked a little different than usual. One attack we saw around that time had traffic coming from 52,467 unique IP addresses. The clients weren’t servers or desktop computers; when we tried to connect to the clients over port 80, we got the login pages to CCTV cameras.

Obviously it’s important to lock down IoT devices so that they can’t be co-opted into evil botnet armies, but when we talk to some IoT developers, we hear a few concerning security patterns. We’ll dive into two problematic areas and their solutions: software updates and TLS.

The Trouble With Updates

With PCs, the end user is ultimately responsible for securing their devices. People understand that they need to update their computers and phones. Just 4 months after Apple released iOS 10, it was installed on 76% of active devices.

People just don’t know that they are supposed to update IoT things like they are supposed to update their computers because they’ve never had to update things Continue reading

Introduction to Uni-Directional Link Detection (UDLD) Protocol

Today I am going to talk about another protocol named as UDLD Uni-Directional Link Detection protocol in details with the different modes used in UDLD.

Before I will start with the UDLD protocol, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 


Thanks for your huge support to our Youtube Channel and the Twitter account. Now let's talk about the UDLD protocol in details now.

Fig 1.1- UDLD Protocol Tx and Rx
What is the UDLD protocol and where we are using this protocol ?
UDLD is a Layer 2 protocol that works with the Layer 1 protocols to determine the physical status of a link. In Layer 1, auto negotiation takes care of physical signalling and fault detection. UDLD performs tasks that auto negotiation cannot perform, such as detecting the identities of neighbors and shutting down misconnected LAN ports. 

Fig 1.2- UDLD Protocol

Switching Basics : STP Root Bridge Election Procedure

Today I am going to talk about the STP (Spanning tree) Root bridge selection procedure. It is one of the most important topic in the Switching and you guys should know about it. I am taking the case where we have three different switches with the MAC addresses and i will talk about how these switches communicate with each other to finally get the root bridge.

Before I will start with the Root bridge in the STP switched network, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos.

Subscribe us on Youtube: http://y2u.be/-5cF6JaNO68 

What is the purpose of the Root Bridge ?
The idea is to have all the communication from source to destination from the root bridge so that we can avoid the loop in the switched LAN network. So before starting the communication in the switched network we need to setup a root bridge.

Spanning-tree election occurs when a switch Continue reading

Displaying Pi Output on an LCD

A few weeks ago, I shared an article about leveraging the Meraki API and a Raspberry Pi to create a Dummy Light for My Network. Today’s article expands on this slightly by adding a 16×2 LCD Display for additional output flexibility. For the sake of demonstration, we will continue to use the Meraki API as the source of what will be displayed. An example of what I have built is shown immediately below in this short video.

TL;DR

To accomplish this, I added the HD44780 to my Raspberry Pi (Pi 2 Model B) using the following pinout.

#connect LCD Pin 1 (VSS) to Ground
#connect LCD Pin 2 (VDD) to 5v rail
#connect LCD Pin 3 (VO) to potentiometer
#connect LCD Pin 4 (RS) to 37
#connect LCD Pin 5 (RW) to Ground
#connect LCD Pin 6 (E) to 35
#connect LCD Pin 12
#connect LCD Pin 13
#connect LCD Pin 14
#connect LCD Pin 15
#connect LCD andode (a) to 5v rail (Phy Pin 2)  with resistance
#connect LCD cathode (k) to Ground Rail (Phy Pin 6)
#connect potentiometer to 5v and ground rails

Next, I wrote the following Python Script.

import requests
import json
import RPi.GPIO as GPIO
import  Continue reading

Displaying Pi Output on an LCD

A few weeks ago, I shared an article about leveraging the Meraki API and a Raspberry Pi to create a Dummy Light for My Network. Today’s article expands on this slightly by adding a 16×2 LCD Display for additional output flexibility. For the sake of demonstration, we will continue to use the Meraki API as the source of what will be displayed. An example of what I have built is shown immediately below in this short video.

TL;DR

To accomplish this, I added the HD44780 to my Raspberry Pi (Pi 2 Model B) using the following pinout.

#connect LCD Pin 1 (VSS) to Ground
#connect LCD Pin 2 (VDD) to 5v rail
#connect LCD Pin 3 (VO) to potentiometer
#connect LCD Pin 4 (RS) to 37
#connect LCD Pin 5 (RW) to Ground
#connect LCD Pin 6 (E) to 35
#connect LCD Pin 12
#connect LCD Pin 13
#connect LCD Pin 14
#connect LCD Pin 15
#connect LCD andode (a) to 5v rail (Phy Pin 2)  with resistance
#connect LCD cathode (k) to Ground Rail (Phy Pin 6)
#connect potentiometer to 5v and ground rails

Next, I wrote the following Python Script.

import requests
import json
import RPi.GPIO as GPIO
import  Continue reading

Displaying Pi Output on an LCD

A few weeks ago, I shared an article about leveraging the Meraki API and a Raspberry Pi to create a Dummy Light for My Network. Today’s article expands on this slightly by adding a 16×2 LCD Display for additional output flexibility. For the sake of demonstration, we will continue to use the Meraki API as the source of what will be displayed. An example of what I have built is shown immediately below in this short video.

TL;DR

To accomplish this, I added the HD44780 to my Raspberry Pi (Pi 2 Model B) using the following pinout.

#connect LCD Pin 1 (VSS) to Ground
#connect LCD Pin 2 (VDD) to 5v rail
#connect LCD Pin 3 (VO) to potentiometer
#connect LCD Pin 4 (RS) to 37
#connect LCD Pin 5 (RW) to Ground
#connect LCD Pin 6 (E) to 35
#connect LCD Pin 12
#connect LCD Pin 13
#connect LCD Pin 14
#connect LCD Pin 15
#connect LCD andode (a) to 5v rail (Phy Pin 2)  with resistance
#connect LCD cathode (k) to Ground Rail (Phy Pin 6)
#connect potentiometer to 5v and ground rails

Next, I wrote the following Python Script.

import requests
import json
import RPi.GPIO as GPIO
import  Continue reading

Let’s Make the Internet Safe for All

Imagine you’re at the starting line of a race, excited about the opportunity that awaits you when you complete the course. The starting pistol is fired and you try to take off, but instead of soaring with the other runners, you stumble. You look down to see that someone has slashed your shoelaces. As you crouch down to try to fix them, you see the others gain distance ahead of you.

This is the reality for many women who use the Internet. The technology is the same and its potential is the same for men and women. But when women go online, there are barriers to access and safety that men do not experience. While men might worry about identity theft or a virus, women – along with trans and non-binary users – are navigating a minefield of sexualized harassment, whether they’re on a dating site, gaming, or using social media. The sexual violence women are exposed to in the physical world translates to the online space.

According to a 2017 survey from Pew Research Center, women and men experience and view online harassment very differently. The survey found that, while 41 percent of Americans have experienced online harassment, Continue reading