Archive

Category Archives for "Networking"

Reflexive Access List

How Does Internet Work - We know what is networking

Some of my readers commented on my old article about reflexive access-list with issues in the configuration. I tried it in the lab again to be sure I didn’t make any mistake in the configuration example and here I’m sharing the lab and the config used. About Reflexive Access Lists Extended ACLs are a special kind of extended access-lists that have limited stateful behaviour technique implemented for TCP sessions. It is better to say that reflexive access-list is simulating stateful behaviour because it, by use of ‘established’ command, is allowing TCP packets that have the ‘ACK’ bit set but not

Reflexive Access List

Review: Tableau takes self-service BI to new heights

Since I reviewed Tableau, Qlik Sense, and Microsoft Power BI in 2015, Tableau and Microsoft have solidified their leadership in the business intelligence (BI) market: Tableau with intuitive interactive exploration, Microsoft with low price and Office integration. Qlik is still a leader compared to the other 20 vendors in the sector, but trails both Tableau and Power BI.To read this article in full or to leave a comment, please click here(Insider Story)

A third of virtual servers are zombies

New research finds that 25% of all physical servers -- and 30% of all virtual servers -- are comatose. These are systems that have no activity in the last six months.The problem with comatose, or zombie, physical servers is well known. Past studies have routinely put the number of undead enterprise physical servers in the 20% to 30% range. But this latest research looked at virtual servers as well, and they may represent a significant cost to IT departments.[ Further reading: The march toward exascale computers ] That's because users may be paying licensing fees on their virtual servers, as well as on the software they support, said the researchers.To read this article in full or to leave a comment, please click here

A third of virtual servers are zombies

New research finds that 25% of all physical servers -- and 30% of all virtual servers -- are comatose. These are systems that have no activity in the last six months.The problem with comatose, or zombie, physical servers is well known. Past studies have routinely put the number of undead enterprise physical servers in the 20% to 30% range. But this latest research looked at virtual servers as well, and they may represent a significant cost to IT departments.[ Further reading: The march toward exascale computers ] That's because users may be paying licensing fees on their virtual servers, as well as on the software they support, said the researchers.To read this article in full or to leave a comment, please click here

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He has seen generations of employees come and go at the software and data security company. There are three generations working side by side at Citrix – and a fourth on the way. Citrix has 9,500 employees with 51 percent being Millennials. With each generation comes a new security challenge that employers need to be overcome so that eventually enterprise security is second nature by the time future generations are in the workforce. CSO Managing Editor Ryan Francis recently asked Black how these challenges can be lessened in future generations.   What is the biggest security issue you see of new employees?To read this article in full or to leave a comment, please click here

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He has seen generations of employees come and go at the software and data security company. There are three generations working side by side at Citrix – and a fourth on the way. Citrix has 9,500 employees with 51 percent being Millennials. With each generation comes a new security challenge that employers need to be overcome so that eventually enterprise security is second nature by the time future generations are in the workforce. CSO Managing Editor Ryan Francis recently asked Black how these challenges can be lessened in future generations.   What is the biggest security issue you see of new employees?To read this article in full or to leave a comment, please click here

Install the CORE Network Emulator from source code

To install the CORE network emulator in recently released Linux distributions, including Ubuntu 16.04 and later, you must install it from source code. There is a bug in CORE that prevents Quagga from starting its routing daemons in newer Linux distributions that is fixed in the latest version of the source code. However, the fix is not in the pre-built CORE packages available on the CORE web site, nor in the Ubuntu repository.

To further create problems, the CORE web site contains old versions of source code and does not point to the latest version of CORE on Github.

Also, the Ubuntu maintainers will remove CORE packages from the Ubuntu repository in the near future because CORE allows unprivileged users to access root privileges, which creates a security problem if CORE is run on a computer used by more than one person.

In this post, I provide a detailed procedure to install CORE from the source code on Github, and to set up your system to run network experiments using the CORE network emulator.

Install CORE from Github

The latest version of CORE is available on Github. To install CORE, first install some prerequisite packages that allow you to Continue reading

Certain HP laptops are found recording users’ keystrokes

Over two dozen HP laptop models have been secretly recording users’ keystrokes, possibly by mistake, according to a Swiss security firm.The keylogger is found within the PCs' audio driver software and has existed since at least Dec. 2015, the security firm Modzero said in a Thursday blog post.   The audio driver was designed to identify when a special key on the PC was used. But in reality, the software will capture all the keystrokes and write them in an unencrypted file located on the laptop.In other cases, the keystrokes will be passed to a Microsoft Windows debugging interface on the PC, and expose them to possible capture, Modzero said.      To read this article in full or to leave a comment, please click here

Certain HP laptops are found recording users’ keystrokes

Over two dozen HP laptop models have been secretly recording users’ keystrokes, possibly by mistake, according to a Swiss security firm.The keylogger is found within the PCs' audio driver software and has existed since at least Dec. 2015, the security firm Modzero said in a Thursday blog post.   The audio driver was designed to identify when a special key on the PC was used. But in reality, the software will capture all the keystrokes and write them in an unencrypted file located on the laptop.In other cases, the keystrokes will be passed to a Microsoft Windows debugging interface on the PC, and expose them to possible capture, Modzero said.      To read this article in full or to leave a comment, please click here

36% off AUKEY LED Desk Lamp With USB Charging Port and Smart Touch Sensor – Deal Alert

Aukey's desk lamp features an extra-large panel, USB charging port, dimmable brightness adjustment & adjustable color temperature, smart touch sensor and sleep mode for reading. Right now its typical list price of $49.99 has been reduced by 20% on Amazon to $39.99, but if you enter the code AUKLTST6 at checkout you'll activate another big price drop down to just $32. See the AUKEY LED Desk Lamp deal now on Amazon.To read this article in full or to leave a comment, please click here

Trump pushes US government to the cloud with cybersecurity order

President Donald Trump has finally signed a long-awaited executive order on cybersecurity, and he called for the U.S. government to move more into the cloud and modernize its IT infrastructure.The order, signed on Thursday, is designed to "centralize risk" and move the government's agencies toward shared IT services, White House homeland security adviser Tom Bossert said in a press briefing   To read this article in full or to leave a comment, please click here

Trump pushes US government to the cloud with cybersecurity order

President Donald Trump has finally signed a long-awaited executive order on cybersecurity, and he called for the U.S. government to move more into the cloud and modernize its IT infrastructure.The order, signed on Thursday, is designed to "centralize risk" and move the government's agencies toward shared IT services, White House homeland security adviser Tom Bossert said in a press briefing   To read this article in full or to leave a comment, please click here

Microsoft now claims half a billion Windows 10 devices

Microsoft's chief executive yesterday touted a new number for Windows 10, saying the operating system now powers 500 million devices -- half way toward a goal the company once gave itself but since discarded.During a keynote address that opened Microsoft's Build developers conference in Seattle Wednesday, CEO Satya Nadella updated the Windows 10 installed base as he pitched the OS to programmers.[ Related: Windows 10 Redstone: A guide to the builds ] "Think about the 500 million Windows 10 devices that you can now reach through the Windows Store," Nadella said. "That reach is what's going to drive our ecosystem going forward. It's going to give each one of you more of an audience, more users, more engagement in a secure way."To read this article in full or to leave a comment, please click here