Archive

Category Archives for "Networking"

Some HP PCs are recording your keystrokes

Nearly thirty different Hewlett-Packard Windows PC models may be recording every keystroke their owners make and storing them in a human-readable file accessible to any user on the PC. Oh, boy.Switzerland-based security company Modzero recently discovered a keylogger present in an audio program in HP PCs called MicTray. Modzero reported it on their blog early Thursday morning.You can also find a complete list of affected HP PC models in the company's security advisory. Affected models include PCs from the HP Elitebook 800 series, HP ProBook 600 and 400 series', the EliteBook Folio G1, and others. The program has existed on HP PCs since at least late 2015, Modzero says.To read this article in full or to leave a comment, please click here

Puppet zeroes in on containers, cloud workloads

Devops platform provider Puppet has introduced its Puppet Cloud Discovery service for learning what, exactly, users have running in the cloud and their impact.As Puppet's first foray into SaaS, the service offers visibility into cloud workloads, providing the same type of introspection as the on-premise Puppet Enterprise platform. For example, it can tell users if they might have vulnerabilities because they're running an outdated version of OpenSSL, or it could inform users which virtual machines need to migrated when moving from Windows Server 2012 to 2016.[ Download the Deep Dive: Monitoring in the age of devops. | Get a digest of the day's top tech stories in the InfoWorld Daily newsletter. ] Cloud Discovery will debut in a preview form on the Amazon Web Services cloud later this month; plans call for it to eventually be supported on other cloud platforms as well.To read this article in full or to leave a comment, please click here

Why digital disruption leaves no room for bimodal IT

Saying bimodal IT is dead may be a tad premature. But as digital disruption continues to sweep across sectors -- driven by companies such as Amazon.com, Uber and Airbnb -- two-speed IT is beginning to look and feel antiquated. Some CIOs and consultants argue that the operating model hinders innovation at a time when companies must accelerate their digital initiatives.Introduced by Gartner in 2014, bimodal IT splits technology departments into two groups: a stable mode (Mode 1) where the bulk of technology is carefully cultivated and refined and a second mode (Mode 2) that espouses experimentation, free-thinking and agility. Forking IT into separate tracks made sense a few years ago, as many CIOs worked to plug gaps in talent, process and technology, Forrester Research analyst Matthew Guarini tells CIO.com.To read this article in full or to leave a comment, please click here

Latest firmware updates for Asus routers fix CSRF security flaws

Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings.The flaws were discovered by researchers from security consultancy outfit Nightwatch Cybersecurity and leave many Asus router models exposed to cross-site request forgery (CSRF) attacks.CSRF is an attack technique that involves hijacking a user's browser when visiting a specially crafted website and forcing it to send unauthorized requests to a different website -- or in this case, the router web-based administration interface accessible over the local area network (LAN).To read this article in full or to leave a comment, please click here

Latest firmware updates for Asus routers fix CSRF security flaws

Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings.The flaws were discovered by researchers from security consultancy outfit Nightwatch Cybersecurity and leave many Asus router models exposed to cross-site request forgery (CSRF) attacks.CSRF is an attack technique that involves hijacking a user's browser when visiting a specially crafted website and forcing it to send unauthorized requests to a different website -- or in this case, the router web-based administration interface accessible over the local area network (LAN).To read this article in full or to leave a comment, please click here

State of the WAN: 50% of WAN traffic is in the cloud

This week, SD-WAN vendor Aryaka released its “2017 State of the WAN Report,” which summarizes a global study conducted by the vendor that looks at WAN trends across a number of verticals and across every region of the globe for 2016.The study was conducted by aggregating data from Aryaka’s customer base. The global SD-WAN vendor has analyzed connectivity to and from over 5,000 locations around the world across more than 550 enterprise organizations. The network data was rolled up and analyzed to see what’s happening on the enterprise WAN.RELATED: SD-WAN: What it is and why you will use it one day Aryaka also provided a comparison with last year’s data set, which provides insight into how things have changed over the past 12 months.To read this article in full or to leave a comment, please click here

State of the WAN: 50% of WAN traffic is in the cloud

This week, SD-WAN vendor Aryaka released its “2017 State of the WAN Report,” which summarizes a global study conducted by the vendor that looks at WAN trends across a number of verticals and across every region of the globe for 2016.The study was conducted by aggregating data from Aryaka’s customer base. The global SD-WAN vendor has analyzed connectivity to and from over 5,000 locations around the world across more than 550 enterprise organizations. The network data was rolled up and analyzed to see what’s happening on the enterprise WAN.RELATED: SD-WAN: What it is and why you will use it one day Aryaka also provided a comparison with last year’s data set, which provides insight into how things have changed over the past 12 months.To read this article in full or to leave a comment, please click here

CCNA Wireless – CCNA Wireless Notes Chapter 1

I’ve started studying for the CCNA wireless exam and thought I would put my notes online. I always learn better when writing and hopefully my notes can be of assistance to someone else. These notes are based on reading the official certification guide “CCNA Wireless 200-355 Official Cert Guide“.

Basic wireless theory

Wireless LANs are based on the 802.11 standard.

Wireless LANs is a lot about Radio Frequency (RF) and planning of the RF environment.

When alternating current is sent through the antenna electric and magnetic fields propagate out and away as traveling waves. They travel along each other and are at right angles to each other.

Electromagnetic waves do not travel in a straight line. They travel by expanding in all directions away from the antenna.

When the electromagnetic waves reach the receiver’s antenna, they induce an electrical signal.

Frequency

Frequency – The number of times a signal makes one complete up and down cycle in one second. Measured in Hertz (Hz)

The frequency range from 3 kHz to 300 GHz is commonly called RF. Types of devices in this frequency range is radar, radio, shortwave radio, television, FM radio, microwave etc. The main two frequency Continue reading

WiFi’s evolving role in IoT

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Internet of Things applications have diverse connectivity requirements in terms of range, data throughput, energy efficiency and device cost. WiFi is often an obvious choice because in-building WiFi coverage is almost ubiquitous, but it is not always the appropriate choice.  This article examines the role WiFi can play and two emerging IEEE standards, 802.11ah and 802.11ax.Data transfer requirements for IoT vary from small, intermittent payloads like utility meters to large amounts of continuous data such as real-time video surveillance. Range requirements can span from very short distances for wearables to several kilometers for weather and agriculture applications.To read this article in full or to leave a comment, please click here

WiFi’s evolving role in IoT

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Internet of Things applications have diverse connectivity requirements in terms of range, data throughput, energy efficiency and device cost. WiFi is often an obvious choice because in-building WiFi coverage is almost ubiquitous, but it is not always the appropriate choice.  This article examines the role WiFi can play and two emerging IEEE standards, 802.11ah and 802.11ax.Data transfer requirements for IoT vary from small, intermittent payloads like utility meters to large amounts of continuous data such as real-time video surveillance. Range requirements can span from very short distances for wearables to several kilometers for weather and agriculture applications.To read this article in full or to leave a comment, please click here

WiFi’s evolving role in IoT

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Internet of Things applications have diverse connectivity requirements in terms of range, data throughput, energy efficiency and device cost. WiFi is often an obvious choice because in-building WiFi coverage is almost ubiquitous, but it is not always the appropriate choice.  This article examines the role WiFi can play and two emerging IEEE standards, 802.11ah and 802.11ax.

Data transfer requirements for IoT vary from small, intermittent payloads like utility meters to large amounts of continuous data such as real-time video surveillance. Range requirements can span from very short distances for wearables to several kilometers for weather and agriculture applications.

To read this article in full or to leave a comment, please click here

WiFi’s evolving role in IoT

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Internet of Things applications have diverse connectivity requirements in terms of range, data throughput, energy efficiency and device cost. WiFi is often an obvious choice because in-building WiFi coverage is almost ubiquitous, but it is not always the appropriate choice.  This article examines the role WiFi can play and two emerging IEEE standards, 802.11ah and 802.11ax.

Data transfer requirements for IoT vary from small, intermittent payloads like utility meters to large amounts of continuous data such as real-time video surveillance. Range requirements can span from very short distances for wearables to several kilometers for weather and agriculture applications.

To read this article in full or to leave a comment, please click here

WiFi’s evolving role in IoT

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Internet of Things applications have diverse connectivity requirements in terms of range, data throughput, energy efficiency and device cost. WiFi is often an obvious choice because in-building WiFi coverage is almost ubiquitous, but it is not always the appropriate choice.  This article examines the role WiFi can play and two emerging IEEE standards, 802.11ah and 802.11ax.

Data transfer requirements for IoT vary from small, intermittent payloads like utility meters to large amounts of continuous data such as real-time video surveillance. Range requirements can span from very short distances for wearables to several kilometers for weather and agriculture applications.

To read this article in full, please click here

Standing Up to a Dangerous New Breed of Patent Troll

On March 20th, Cloudflare received our first patent infringement claim: Blackbird Tech LLC v. Cloudflare, Inc. Today we’re filing our Answer to that claim in a federal court in Delaware. We have very strong arguments we will present in the litigation, mostly because the patent asserted against us does not have anything to do with our technology.

  • The infringement claim is not a close one. The asserted patent, US 6453335 (‘335 patent) was filed in 1998, and describes a system for monitoring an existing data channel and inserting error pages when transmission rates fall below a certain level. Nothing from 1998—including the ’335 patent—comes close to describing our state-of-the-art product that is provisioned via DNS, speeds up internet content delivery, and protects against malicious attackers. Our technology is innovative and different, and Cloudflare’s technology has about 150 patents issued or in process.

  • We also expect to show that the patent itself is invalid. For example, if the ’335 patent is read broadly enough to cover our system (which shouldn’t happen), it would also cover any system where electronic communications are examined and redacted or modified. But this is not new. Filtering products performing similar functions were around long before Continue reading

Project Jengo: Cloudflare’s Prior Art Search Bounty

Bounty Hunter Attacks Jengo Fett by Brickset (Flickr)

As readers of this blog likely know, especially if you read this post, Cloudflare has been sued by a dangerous new breed of patent troll, Blackbird Technologies, asserting a very old and very vague patent. And we know we are not alone in being frustrated about the way that such patent trolls inhibit the growth of innovative companies. Cloudflare is asking for your help in this effort, and we’re putting our money where our mouth is.

Patent trolls take advantage of a system they assume is tilted in their favor, where they can take vague technology patents issued years ago and apply them as broadly as imaginable to the latest technology. And they do this without the limitations of having to show the original patent holder would have actually exercised the patent, because most of them don’t, at all. Patent trolls think they can sit back and pick off settlements from companies because their lawsuits are a nuisance and the costs of defending those suits are considerable.

Changing this dynamic and leveling the playing field is going to require an entirely new approach. Fighting such strong, though perverse, economic incentives is going Continue reading

Up to 60% Savings on Steam Gaming Gear With These Active Discounts – Deal Alert

Save 60% on Steam Link The Steam Link allows existing Steam gamers to expand the range of their current gaming set up via their home network. Just connect your Steam PC or Steam Machine to your home network, plug into a TV, and stream your games to the Link at 1080p. It's a #1 best seller on Amazon where it averages 4 out of 5 stars from 800 people, and its typical list price of $50 has been discounted to $20.To read this article in full or to leave a comment, please click here