In August 2017, a new botnet called WireX appeared and began causing damage by launching significant DDoS attacks. The botnet counted tens of thousands of nodes, most of which appeared to be hacked Android mobile devices.
First, tracking the botnet down and mitigating its activities was part of a wide collaborative effort by several tech companies. Researchers from Akamai, Cloudflare, Flashpoint, Google, Oracle Dyn, RiskIQ, Team Cymru, and other organizations cooperated to combat this botnet. This is a great example of Collaborative Security in practice.
Second, while researchers shared the data, analysed the signatures, and were able to track a set of malware apps, Google played an important role in cleaning them up from the Play Store and infected devices.
Its Verify Apps is a cloud-based service that proactively checks every application prior to install to determine if the application is potentially harmful, and subsequently rechecks devices regularly to help ensure they’re safe. Verify Apps checks more than 6 billion instances of installed applications and scans around 400 million devices per day.
In the case of WireX, the apps had previously passed the checks. But thanks to the researcher’s findings, Google Continue reading
On Tuesday, the U.S. Congress continued to grapple with the potential implications of the Stop Enabling Sex Traffickers Act (SESTA). SESTA would carve out an exception to Section 230 of the 1996 Communications Decency Act, which is considered a bedrock upon which the modern Internet has flourished. If SESTA became law, websites that host ads for sex with children would be not be immune from state prosecutions and private lawsuits [although under 320(c)(1), websites are already subject to federal criminal law statutes].
Section 230 of the Communications Decency Act (c)(1) states, “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” 230(c)(2) protects actors who proactively block and screen for offensive material. These provisions have allowed the Internet to grow and develop without the threat of lawsuits smothering its potential. If the websites of 1990 had been liable for everything their users posted, the Internet would look very different today.
Since 1996, the Internet has dramatically changed in ways unanticipated by the Communications Decency Act. The Internet provides the platform to publish material that can reach enormous numbers of people around Continue reading
Dell EMC also partners with VMware and Nutanix on its HCI portfolio.
The software helps customers formulate a cloud strategy.
Scality Direct is also available in a stateless version for hosting on a VM within Azure.
Tony Li has had a distinguished career working as a networking software architect at some of the largest networking vendors in the world. In this episode of Network Collective, Tony joins us to discuss his involvement in the creation and implementation of BGP, the routing protocol that enables the Internet.
The image above is a capture of the original BGP design, sketched on two napkins by Kirk Lougheed of Cisco and Yakov Rekhter of IBM in 1989.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Tony Li – BGP appeared first on Network Collective.
Tony Li has had a distinguished career working as a networking software architect at some of the largest networking vendors in the world. In this episode of Network Collective, Tony joins us to discuss his involvement in the creation and implementation of BGP, the routing protocol that enables the Internet.
The image above is a capture of the original BGP design, sketched on two napkins by Kirk Lougheed of Cisco and Yakov Rekhter of IBM in 1989.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Tony Li – BGP appeared first on Network Collective.
Continuing with my theme of paying premium prices for faulty products, Michael McNamara shares a recent experience: I just recently had two HA pairs of Cisco ASA firewalls just stop communicating. A reboot of both the primary and secondary firewall in each HA pair resolved the problem. I had never observed such odd behavior from […]
The post Response: Cisco ASA Firewall breaks after 213 days of uptime appeared first on EtherealMind.
The company joined CNCF and the Open API Initiative.
Oops, lost a network device. I sure hope we have a configuration backup…
On the Solarwinds Thwack Geek Speak blog I looked at how configuration management can help not just with total loss scenarios, but also with audit and compliance issue. Please do take a trip to Thwack and check out my post, “You Need Configuration Management. Really“.
Please see my Disclosures page for more information about my role as a Solarwinds Ambassador.
If you liked this post, please do click through to the source at You Need Configuration Management. Really. (Thwack) and give me a share/like. Thank you!
Bin Packing Problem ? What is Bin Packing ? I will explain in this post Bin Packing Problem in MPLS Traffic Engineering. Very complex post normally but I will make it simple for you. And trust me, it is important to understand. Before I start explaining Bin Packing problem, let’s just […]
The post Bin Packing Problem of Distributed Traffic Engineering appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
What is IRU (a.k.a Indefeasible Right of Use) ? If you are working in the Operator, Service Provider or Telco/Carrier networks, you probably heard this term. If you haven’t, you need to learn it. Note: This content is received from my Telecom/Service Provider Course. You can join the course and learn much more about […]
The post What is IRU ? Indefeasible Right of Use ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.