Archive

Category Archives for "Networking"

Displaying Pi Output on an LCD

A few weeks ago, I shared an article about leveraging the Meraki API and a Raspberry Pi to create a Dummy Light for My Network. Today’s article expands on this slightly by adding a 16×2 LCD Display for additional output flexibility. For the sake of demonstration, we will continue to use the Meraki API as the source of what will be displayed. An example of what I have built is shown immediately below in this short video.

TL;DR

To accomplish this, I added the HD44780 to my Raspberry Pi (Pi 2 Model B) using the following pinout.

#connect LCD Pin 1 (VSS) to Ground
#connect LCD Pin 2 (VDD) to 5v rail
#connect LCD Pin 3 (VO) to potentiometer
#connect LCD Pin 4 (RS) to 37
#connect LCD Pin 5 (RW) to Ground
#connect LCD Pin 6 (E) to 35
#connect LCD Pin 12
#connect LCD Pin 13
#connect LCD Pin 14
#connect LCD Pin 15
#connect LCD andode (a) to 5v rail (Phy Pin 2)  with resistance
#connect LCD cathode (k) to Ground Rail (Phy Pin 6)
#connect potentiometer to 5v and ground rails

Next, I wrote the following Python Script.

import requests
import json
import RPi.GPIO as GPIO
import  Continue reading

Displaying Pi Output on an LCD

A few weeks ago, I shared an article about leveraging the Meraki API and a Raspberry Pi to create a Dummy Light for My Network. Today’s article expands on this slightly by adding a 16×2 LCD Display for additional output flexibility. For the sake of demonstration, we will continue to use the Meraki API as the source of what will be displayed. An example of what I have built is shown immediately below in this short video.

TL;DR

To accomplish this, I added the HD44780 to my Raspberry Pi (Pi 2 Model B) using the following pinout.

#connect LCD Pin 1 (VSS) to Ground
#connect LCD Pin 2 (VDD) to 5v rail
#connect LCD Pin 3 (VO) to potentiometer
#connect LCD Pin 4 (RS) to 37
#connect LCD Pin 5 (RW) to Ground
#connect LCD Pin 6 (E) to 35
#connect LCD Pin 12
#connect LCD Pin 13
#connect LCD Pin 14
#connect LCD Pin 15
#connect LCD andode (a) to 5v rail (Phy Pin 2)  with resistance
#connect LCD cathode (k) to Ground Rail (Phy Pin 6)
#connect potentiometer to 5v and ground rails

Next, I wrote the following Python Script.

import requests
import json
import RPi.GPIO as GPIO
import  Continue reading

Let’s Make the Internet Safe for All

Imagine you’re at the starting line of a race, excited about the opportunity that awaits you when you complete the course. The starting pistol is fired and you try to take off, but instead of soaring with the other runners, you stumble. You look down to see that someone has slashed your shoelaces. As you crouch down to try to fix them, you see the others gain distance ahead of you.

This is the reality for many women who use the Internet. The technology is the same and its potential is the same for men and women. But when women go online, there are barriers to access and safety that men do not experience. While men might worry about identity theft or a virus, women – along with trans and non-binary users – are navigating a minefield of sexualized harassment, whether they’re on a dating site, gaming, or using social media. The sexual violence women are exposed to in the physical world translates to the online space.

According to a 2017 survey from Pew Research Center, women and men experience and view online harassment very differently. The survey found that, while 41 percent of Americans have experienced online harassment, Continue reading

Recent Russian Routing Leak was Largely Preventable

Last week, the IP address space belonging to several high-profile companies, including Google, Facebook and Apple, was briefly announced out of Russia, as was first reported by BGPmon.

Following the incident, Job Snijders of NTT wrote in a post entitled, “What to do about BGP hijacks”.  He stated that, given the inherent security weaknesses in BGP, things will only improve “the moment it becomes socially unacceptable to operate an Internet network without adequate protections in place” and thus customers would stop buying transit from providers that operate without proper route filtering.

Since Job has presented at NANOG about the various filtering methods employed by NTT, I decided to look into how well NTT (AS2914) did in this particular incident.  While a handful of the 80 misdirected routes were ultimately carried on by AS2914 to the greater internet, NTT didn’t contribute to the leaking of any of the major internet companies, such as Facebook, Google, Apple, etc.  In fact, when one analyzes the propagation of every one of these leaked routes, a pattern begins to emerge.

Route Leaks by AS39523

On 12 December 2017, AS39523 announced 80 prefixes (only one of which was theirs) for two different 3-4 Continue reading

IDG Contributor Network: How interconnection can set the pace as holiday shopping gets more digital

The arrival of the holiday shopping season always brings sharp focus onto ecommerce, which just keeps disrupting how retailers and consumers shop. But it’s striking just how much running room remains in front of this trend, which already has a couple decades of Christmases under its big black Santa belt.According to eMarketer, ecommerce sales will grow more than 23 percent in 2017 – and still only account for a tenth of retail sales globally. Opportunities remain huge in the online shopping sector, but only if companies can continue to keep the digital payments at the heart of it simple, fast and secure for consumers and retailers alike. That’s a perpetual challenge.To read this article in full, please click here

IDG Contributor Network: How interconnection can set the pace as holiday shopping gets more digital

The arrival of the holiday shopping season always brings sharp focus onto ecommerce, which just keeps disrupting how retailers and consumers shop. But it’s striking just how much running room remains in front of this trend, which already has a couple decades of Christmases under its big black Santa belt.According to eMarketer, ecommerce sales will grow more than 23 percent in 2017 – and still only account for a tenth of retail sales globally. Opportunities remain huge in the online shopping sector, but only if companies can continue to keep the digital payments at the heart of it simple, fast and secure for consumers and retailers alike. That’s a perpetual challenge.To read this article in full, please click here

IDG Contributor Network: How interconnection can set the pace as holiday shopping gets more digital

The arrival of the holiday shopping season always brings sharp focus onto ecommerce, which just keeps disrupting how retailers and consumers shop. But it’s striking just how much running room remains in front of this trend, which already has a couple decades of Christmases under its big black Santa belt.According to eMarketer, ecommerce sales will grow more than 23 percent in 2017 – and still only account for a tenth of retail sales globally. Opportunities remain huge in the online shopping sector, but only if companies can continue to keep the digital payments at the heart of it simple, fast and secure for consumers and retailers alike. That’s a perpetual challenge.To read this article in full, please click here

Squinting at ASCII on Linux

Back when I started working with computers, understanding the nature of ASCII was exciting. In fact, just knowing how to convert binary to hex was fun.That was a lot of years ago — berfore ASCII had yet reached drinking age — but character encoding standards are as important as ever today with the internet being so much a part of our business and our personal lives. They're also more complex and more numerous than you might imagine. So, let’s dive into some of the details of what ASCII is and some of the commands that make it easier to see coding standards in action.Why ASCII? ASCII came about to circumvent the problem that different types of electronic systems were storing text in different ways. They all used some form of ones and zeroes (or ONs and OFFs), but the issue of compatibility became important when they needed to interact. So, ASCII was developed primarily to provide encoding consistency. It became a standard in the U.S. in 1960. Initially, ASCII characters used only 7 bits. Some years later, ASCII was extended to use all 8 bits in each byte.To read this article in full, please click here

Technical reading from the Cloudflare blog for the holidays

During 2017 Cloudflare published 172 blog posts (including this one). If you need a distraction from the holiday festivities at this time of year here are some highlights from the year.

CC BY 2.0 image by perzon seo

The WireX Botnet: How Industry Collaboration Disrupted a DDoS Attack

We worked closely with companies across the industry to track and take down the Android WireX Botnet. This blog post goes into detail about how that botnet operated, how it was distributed and how it was taken down.

Randomness 101: LavaRand in Production

The wall of Lava Lamps in the San Francisco office is used to feed entropy into random number generators across our network. This blog post explains how.

ARM Takes Wing: Qualcomm vs. Intel CPU comparison

Our network of data centers around the world all contain Intel-based servers, but we're interested in ARM-based servers because of the potential cost/power savings. This blog post took a look at the relative performance of Intel processors and Qualcomm's latest server offering.

How to Monkey Patch the Linux Kernel

One engineer wanted to combine the Dvorak and QWERTY keyboard layouts and did so by patching the Linux kernel using SystemTap. This blog explains Continue reading