Archive

Category Archives for "Networking"

A third of virtual servers are zombies

New research finds that 25% of all physical servers -- and 30% of all virtual servers -- are comatose. These are systems that have no activity in the last six months.The problem with comatose, or zombie, physical servers is well known. Past studies have routinely put the number of undead enterprise physical servers in the 20% to 30% range. But this latest research looked at virtual servers as well, and they may represent a significant cost to IT departments.[ Further reading: The march toward exascale computers ] That's because users may be paying licensing fees on their virtual servers, as well as on the software they support, said the researchers.To read this article in full or to leave a comment, please click here

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He has seen generations of employees come and go at the software and data security company. There are three generations working side by side at Citrix – and a fourth on the way. Citrix has 9,500 employees with 51 percent being Millennials. With each generation comes a new security challenge that employers need to be overcome so that eventually enterprise security is second nature by the time future generations are in the workforce. CSO Managing Editor Ryan Francis recently asked Black how these challenges can be lessened in future generations.   What is the biggest security issue you see of new employees?To read this article in full or to leave a comment, please click here

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He has seen generations of employees come and go at the software and data security company. There are three generations working side by side at Citrix – and a fourth on the way. Citrix has 9,500 employees with 51 percent being Millennials. With each generation comes a new security challenge that employers need to be overcome so that eventually enterprise security is second nature by the time future generations are in the workforce. CSO Managing Editor Ryan Francis recently asked Black how these challenges can be lessened in future generations.   What is the biggest security issue you see of new employees?To read this article in full or to leave a comment, please click here

Install the CORE Network Emulator from source code

To install the CORE network emulator in recently released Linux distributions, including Ubuntu 16.04 and later, you must install it from source code. There is a bug in CORE that prevents Quagga from starting its routing daemons in newer Linux distributions that is fixed in the latest version of the source code. However, the fix is not in the pre-built CORE packages available on the CORE web site, nor in the Ubuntu repository.

To further create problems, the CORE web site contains old versions of source code and does not point to the latest version of CORE on Github.

Also, the Ubuntu maintainers will remove CORE packages from the Ubuntu repository in the near future because CORE allows unprivileged users to access root privileges, which creates a security problem if CORE is run on a computer used by more than one person.

In this post, I provide a detailed procedure to install CORE from the source code on Github, and to set up your system to run network experiments using the CORE network emulator.

Install CORE from Github

The latest version of CORE is available on Github. To install CORE, first install some prerequisite packages that allow you to Continue reading

Certain HP laptops are found recording users’ keystrokes

Over two dozen HP laptop models have been secretly recording users’ keystrokes, possibly by mistake, according to a Swiss security firm.The keylogger is found within the PCs' audio driver software and has existed since at least Dec. 2015, the security firm Modzero said in a Thursday blog post.   The audio driver was designed to identify when a special key on the PC was used. But in reality, the software will capture all the keystrokes and write them in an unencrypted file located on the laptop.In other cases, the keystrokes will be passed to a Microsoft Windows debugging interface on the PC, and expose them to possible capture, Modzero said.      To read this article in full or to leave a comment, please click here

Certain HP laptops are found recording users’ keystrokes

Over two dozen HP laptop models have been secretly recording users’ keystrokes, possibly by mistake, according to a Swiss security firm.The keylogger is found within the PCs' audio driver software and has existed since at least Dec. 2015, the security firm Modzero said in a Thursday blog post.   The audio driver was designed to identify when a special key on the PC was used. But in reality, the software will capture all the keystrokes and write them in an unencrypted file located on the laptop.In other cases, the keystrokes will be passed to a Microsoft Windows debugging interface on the PC, and expose them to possible capture, Modzero said.      To read this article in full or to leave a comment, please click here

36% off AUKEY LED Desk Lamp With USB Charging Port and Smart Touch Sensor – Deal Alert

Aukey's desk lamp features an extra-large panel, USB charging port, dimmable brightness adjustment & adjustable color temperature, smart touch sensor and sleep mode for reading. Right now its typical list price of $49.99 has been reduced by 20% on Amazon to $39.99, but if you enter the code AUKLTST6 at checkout you'll activate another big price drop down to just $32. See the AUKEY LED Desk Lamp deal now on Amazon.To read this article in full or to leave a comment, please click here

Trump pushes US government to the cloud with cybersecurity order

President Donald Trump has finally signed a long-awaited executive order on cybersecurity, and he called for the U.S. government to move more into the cloud and modernize its IT infrastructure.The order, signed on Thursday, is designed to "centralize risk" and move the government's agencies toward shared IT services, White House homeland security adviser Tom Bossert said in a press briefing   To read this article in full or to leave a comment, please click here

Trump pushes US government to the cloud with cybersecurity order

President Donald Trump has finally signed a long-awaited executive order on cybersecurity, and he called for the U.S. government to move more into the cloud and modernize its IT infrastructure.The order, signed on Thursday, is designed to "centralize risk" and move the government's agencies toward shared IT services, White House homeland security adviser Tom Bossert said in a press briefing   To read this article in full or to leave a comment, please click here

Microsoft now claims half a billion Windows 10 devices

Microsoft's chief executive yesterday touted a new number for Windows 10, saying the operating system now powers 500 million devices -- half way toward a goal the company once gave itself but since discarded.During a keynote address that opened Microsoft's Build developers conference in Seattle Wednesday, CEO Satya Nadella updated the Windows 10 installed base as he pitched the OS to programmers.[ Related: Windows 10 Redstone: A guide to the builds ] "Think about the 500 million Windows 10 devices that you can now reach through the Windows Store," Nadella said. "That reach is what's going to drive our ecosystem going forward. It's going to give each one of you more of an audience, more users, more engagement in a secure way."To read this article in full or to leave a comment, please click here

What has OpenStack done for me lately? The next 5 issues to address

This contributed piece has been edited and approved by Network World editorsOpenStack has been on a roll, seeing increased adoption across the business world, highlighted by major deployments from leading organizations like Verizon, BBVA, and NASA Jet Propulsion Laboratory, as well as continued growth in the contributing community. But what’s next?While it’s nice to see the success of OpenStack in the enterprise, the community cannot rest on its proverbial laurels. Here’s what the OpenStack community and ecosystem need to accomplish next:* Containers, containers and ... containers.  OpenStack isn’t the hottest open source technology on the block anymore, that title is now owned by Linux containers. An application packaging technology that allows for greater workload flexibility and portability, support for containerized applications will be key to OpenStack moving forward, especially as enterprise interest intersects both Linux containers and OpenStack.To read this article in full or to leave a comment, please click here

What has OpenStack done for me lately? The next 5 issues to address

This contributed piece has been edited and approved by Network World editors

OpenStack has been on a roll, seeing increased adoption across the business world, highlighted by major deployments from leading organizations like Verizon, BBVA, and NASA Jet Propulsion Laboratory, as well as continued growth in the contributing community. But what’s next?

While it’s nice to see the success of OpenStack in the enterprise, the community cannot rest on its proverbial laurels. Here’s what the OpenStack community and ecosystem need to accomplish next:

* Containers, containers and ... containers.  OpenStack isn’t the hottest open source technology on the block anymore, that title is now owned by Linux containers. An application packaging technology that allows for greater workload flexibility and portability, support for containerized applications will be key to OpenStack moving forward, especially as enterprise interest intersects both Linux containers and OpenStack.

To read this article in full or to leave a comment, please click here

What has OpenStack done for me lately? The next 5 issues to address

This contributed piece has been edited and approved by Network World editors

OpenStack has been on a roll, seeing increased adoption across the business world, highlighted by major deployments from leading organizations like Verizon, BBVA, and NASA Jet Propulsion Laboratory, as well as continued growth in the contributing community. But what’s next?

While it’s nice to see the success of OpenStack in the enterprise, the community cannot rest on its proverbial laurels. Here’s what the OpenStack community and ecosystem need to accomplish next:

* Containers, containers and ... containers.  OpenStack isn’t the hottest open source technology on the block anymore, that title is now owned by Linux containers. An application packaging technology that allows for greater workload flexibility and portability, support for containerized applications will be key to OpenStack moving forward, especially as enterprise interest intersects both Linux containers and OpenStack.

To read this article in full or to leave a comment, please click here

What has OpenStack done for me lately? The next 5 issues to address

This contributed piece has been edited and approved by Network World editors

OpenStack has been on a roll, seeing increased adoption across the business world, highlighted by major deployments from leading organizations like Verizon, BBVA, and NASA Jet Propulsion Laboratory, as well as continued growth in the contributing community. But what’s next?

While it’s nice to see the success of OpenStack in the enterprise, the community cannot rest on its proverbial laurels. Here’s what the OpenStack community and ecosystem need to accomplish next:

* Containers, containers and ... containers.  OpenStack isn’t the hottest open source technology on the block anymore, that title is now owned by Linux containers. An application packaging technology that allows for greater workload flexibility and portability, support for containerized applications will be key to OpenStack moving forward, especially as enterprise interest intersects both Linux containers and OpenStack.

To read this article in full, please click here