Archive

Category Archives for "Networking"

IDG Contributor Network: Red Hat rolls out the announcements at its annual summit

Last week open source company Red Hat held its annual summit. I didn't actually attended the event, but I took the opportunity to follow along virtually. Many of my analyst friends were there, and between their missives, some back-channel conversations and interaction with their AR/PR team, I got a pretty good handle on what was up.This comes at an interesting time for Red Hat. Its original business, Red Hat Linux in all its flavors, is going well, but newer open-source initiatives (OpenStack, OpenShift, Docker, etc.) have muddied the waters and created a requirement for Red Hat to embrace different areas.To read this article in full or to leave a comment, please click here

US device searches at borders ignite resistance

Aaron Gach wasn't expecting U.S. Customs and Border Protection agents to demand to search his smartphone when he returned to San Fransisco from Belgium in February.The artist and magician, a U.S. citizen, had just attended an art event near Brussels and was targeted for advanced screening by CBP after his flight landed in the U.S. During a series of questions from CBP agents ("Did you pack your bag yourself?"), they repeatedly asked to search his smartphone, Gach said."Do you understand that if you choose not to unlock your phone we may need to detain your other personal effects?" one agent told him, according to a description of the encounter that Gach posted online.To read this article in full or to leave a comment, please click here

US device searches at borders ignite resistance

Aaron Gach wasn't expecting U.S. Customs and Border Protection agents to demand to search his smartphone when he returned to San Fransisco from Belgium in February.The artist and magician, a U.S. citizen, had just attended an art event near Brussels and was targeted for advanced screening by CBP after his flight landed in the U.S. During a series of questions from CBP agents ("Did you pack your bag yourself?"), they repeatedly asked to search his smartphone, Gach said."Do you understand that if you choose not to unlock your phone we may need to detain your other personal effects?" one agent told him, according to a description of the encounter that Gach posted online.To read this article in full or to leave a comment, please click here

How to prevent your data from being searched at the US border

During the past two years, U.S. Customs and Border Patrol has targeted ever larger numbers of travelers' smartphones and laptops for searches as they cross the border into the country.U.S. courts have generally upheld a so-called border search exception to the Constitution's Fourth Amendment, allowing CBP to search electronic devices without a court-ordered warrant. In April, a group of lawmakers introduced legislation to require warrants to search devices owned by U.S. citizens and other legal residents, but for now, the law allows for warrantless device searches.To read this article in full or to leave a comment, please click here

How to prevent your data from being searched at the US border

During the past two years, U.S. Customs and Border Patrol has targeted ever larger numbers of travelers' smartphones and laptops for searches as they cross the border into the country.U.S. courts have generally upheld a so-called border search exception to the Constitution's Fourth Amendment, allowing CBP to search electronic devices without a court-ordered warrant. In April, a group of lawmakers introduced legislation to require warrants to search devices owned by U.S. citizens and other legal residents, but for now, the law allows for warrantless device searches.To read this article in full or to leave a comment, please click here

40% off Char-Broil Performance TRU Infrared 450 3-Burner Cart Gas Grill – Deal Alert

The Char-Broil Performance TRU Infrared 450 3-Burner Cart Gas Grill is currently discounted a significant 40% to just $155, making it a worthy consideration for the upcoming Father's day. If I'm reading it correctly, $155 puts this 4-burner 450 model at $35 cheaper than the lesser 2-burner 300 model. Double-check my math, but I'm feeling good about this one. It would appear that you're getting a lot for your money at this price. The grill features an electronic ignition, infrared technology for faster and more even heating, a 10,000 BTU side-burner, durable porcelain-coated grates, and a generous 450 square-inch cooking surface. If you want or need a new grill at a very respectable price, see this deal now on Amazon. To read this article in full or to leave a comment, please click here

May 2017 Dubai CCDE Bootcamp Attendees Feedbacks !

Dubai 5 days Instructor Led Bootcamp just finished. Attendees were from Spain, Bahrain , Saudi Arabia, India and Abu Dhabi.   I discussed several real network designs with attendees such as one of the bank networks, one financial institute, couple service provider networks (Belong to these students or they involve designs of these networks)     […]

The post May 2017 Dubai CCDE Bootcamp Attendees Feedbacks ! appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

81% off Centon 4 GB DataStick Pro USB 2.0 Flash Drive – Deal Alert

This 4GB USB drive from Centon is just a little over $3 right now -- so cheap that Amazon won't ship it on its own. But if your cart totals $25 or more, toss in some of these sticks right now for dirt cheap. The flash drive is built with a sturdy aluminum housing, works on both PC and Mac, and is a cheap & simple way to move files around. It's listed on Amazon as an add-on item, meaning its cost prohibitive to ship on its own, but if your cart totals $25 or more, take advantage of this deal and get yourself 4GB of portable storage for a whopping 81% off its typical list price. The sticks right now are listed for just $3.33. See this deal on Amazon. To read this article in full or to leave a comment, please click here

Supply chain attack hits Mac users of HandBrake video converter app

Hackers compromised a download server for HandBrake, a popular open-source program for converting video files, and used it to distribute a macOS version of the application that contained malware.The HandBrake development team posted a security warning on the project's website and support forum on Saturday, alerting Mac users who downloaded and installed the program from May 2 to May 6 to check their computers for malware.The attackers compromised only a download mirror hosted under download.handbrake.fr, with the primary download server remaining unaffected. Because of this, users who downloaded HandBrake-1.0.7.dmg during the period in question have a 50/50 chance of having received a malicious version of the file, the HandBreak team said.To read this article in full or to leave a comment, please click here

Supply chain attack hits Mac users of HandBrake video converter app

Hackers compromised a download server for HandBrake, a popular open-source program for converting video files, and used it to distribute a macOS version of the application that contained malware.The HandBrake development team posted a security warning on the project's website and support forum on Saturday, alerting Mac users who downloaded and installed the program from May 2 to May 6 to check their computers for malware.The attackers compromised only a download mirror hosted under download.handbrake.fr, with the primary download server remaining unaffected. Because of this, users who downloaded HandBrake-1.0.7.dmg during the period in question have a 50/50 chance of having received a malicious version of the file, the HandBreak team said.To read this article in full or to leave a comment, please click here

Google Project Zero researchers find ‘crazy bad’ Windows RCE flaw

A remote code execution (RCE) vulnerability is about as bad as it gets. And if it is in Windows, then a multitude of people are at risk until it is patched.The question is, though, if the existence of a critical flaw is disclosed shortly before Patch Tuesday, will Microsoft scramble to immediately close that hole or will the company sit on it and wait out the 90-day disclosure deadline? We will find out tomorrow on Patch Tuesday if Microsoft took immediate action to close a “crazy bad” RCE flaw in Windows that was discovered by Google’s zero-day finders.On the cusp of the weekend, Google Project Zero researcher Tavis Ormandy sent out an alarming tweet. He and fellow Project Zero researcher Natalie Silvanovich had discovered not just an RCE in Windows, but the “worst Windows remote code exec in recent memory.” He went so far as to call it “crazy bad.”To read this article in full or to leave a comment, please click here

Google Project Zero researchers find ‘crazy bad’ Windows RCE flaw

A remote code execution (RCE) vulnerability is about as bad as it gets. And if it is in Windows, then a multitude of people are at risk until it is patched.The question is, though, if the existence of a critical flaw is disclosed shortly before Patch Tuesday, will Microsoft scramble to immediately close that hole or will the company sit on it and wait out the 90-day disclosure deadline? We will find out tomorrow on Patch Tuesday if Microsoft took immediate action to close a “crazy bad” RCE flaw in Windows that was discovered by Google’s zero-day finders.On the cusp of the weekend, Google Project Zero researcher Tavis Ormandy sent out an alarming tweet. He and fellow Project Zero researcher Natalie Silvanovich had discovered not just an RCE in Windows, but the “worst Windows remote code exec in recent memory.” He went so far as to call it “crazy bad.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to organize workspaces around people and build culture

“Move in or get out.”That was the injunction handed down to IBM’s marketing team just two months ago. Admittedly, the news wasn’t delivered in quite such austere terms. But the result was the same.Forcing employees who work remotely to move their families and lives onsite is a bold move. Three weeks ago, I dove into the rationale behind hardline no-remote-working policies and made a data-driven defense based on responses from 25,234 workers found in The Changing World of Work: A Global Survey.To read this article in full or to leave a comment, please click here

25% off YETI Rambler 20 oz Stainless Steel Vacuum Insulated Tumbler with Lid – Deal Alert

Mom or Dad's day gift alert, here. The Rambler 20 oz. bottle is next-level, and the perfect addition to rough commutes, day hikes, or kayak sessions. Features a no-sweat design and tough 18/8 stainless steel construction -- kitchen-grade, durable, and rust-proof to last a lifetime. Yeti has over-engineered these double-wall insulated tumblers to ensure your drink still keeps its temperature no matter how much of a beating this cup takes. Its clear, dishwasher-safe and shatterproof cap protects your truck cab or day pack from spills. The Rambler 20 oz. bottle stands 6 7/8 inches high, and has a lip diameter of 3.5 inches, sized to fit in standard sized cup holders. The popular Yeti bottle's list price has been reduced 25% to $22.49. See the deal now on Amazon.To read this article in full or to leave a comment, please click here

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count.+More on Network World: FBI/FTC: Watch those e-mails from your “CEO”+The BEC scam is typically carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds, the IC3 stated. Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices. The scam has evolved to include the compromising of legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees, and may not always be associated with a request for transfer of funds, the IC3 stated.To read this article in full or to leave a comment, please click here

The real-world guide to Windows 10 migration

With Windows 10 already deployed on more than 400 million computers, it’s hard to argue with its success. But the fastest adoption rate of any Windows release has thus far played out predominantly on consumer devices. The enterprise tells a different story, with organizations still mostly on Windows 7. But the change is coming fast. Brad Anderson, corporate vice president at Microsoft, recently announced that 86 percent of enterprises will upgrade to Windows 10 within three to four years; of these, organizations 47 percent said they will upgrade in the next 12 months.To read this article in full or to leave a comment, please click here(Insider Story)

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count.+More on Network World: FBI/FTC: Watch those e-mails from your “CEO”+The BEC scam is typically carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds, the IC3 stated. Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices. The scam has evolved to include the compromising of legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees, and may not always be associated with a request for transfer of funds, the IC3 stated.To read this article in full or to leave a comment, please click here