Archive

Category Archives for "Networking"

38% off Seagate Backup Plus Ultra Slim 2TB Portable External Hard Drive – Deal Post

The Backup Plus Ultra Slim Portable Drive is one of Seagate's thinnest and most eye-catching portable hard drives. Available in stunning gold and platinum colors- style meets storage- and easily slips into your backpack along with your other essentials. At 9.6mm thin, capacity is not sacrificed with 1TB and 2TB options-bring your most important files and head out the door. Back up and manage your favorite files from your computer, tablet and mobile devices using the Seagate Dashboard. Run a one-click backup or schedule an automatic backup plan to help protect your files. Convenient tools for local, mobile, cloud and social media backup at the ready. With high-speed USB 3.0 and 2.0 connectivity, you can depend on seamless plug-and-play functionality. And the USB bus-power eliminates the need for an external power supply, letting you access your files while on the move. The Lyve mobile and desktop app gives you the ability to access a single, consolidated and personalized photo and video library. When you purchase a Backup Plus Ultra Slim Portable Drive, you get 200GB of OneDrive cloud storage for 2 years (US$95 value).   The Backup Plus Portable Drive averages 4.5 out of 5 stars on Continue reading

IDG Contributor Network: NCAA coaches have a lot in common with data center managers

As April brings the best college basketball teams together for the final leg of March Madness, college basketball is in full swing. With all this attention on the top teams and programs in country, there is more than one parallel between data center managers and NCAA basketball coaches.Their management techniques and job descriptions often align: optimizing lineups to ensure they have the best team on the floor in the final seconds of a big game, or stressing teamwork and cooperation during tight deadlines, outages or other time-sensitive situations. Coaches and data center managers play a similar role to ensure their team (or infrastructure) is ready to perform when it matters most.To read this article in full or to leave a comment, please click here

IDG Contributor Network: NCAA coaches have a lot in common with data center managers

As April brings the best college basketball teams together for the final leg of March Madness, college basketball is in full swing. With all this attention on the top teams and programs in country, there is more than one parallel between data center managers and NCAA basketball coaches.Their management techniques and job descriptions often align: optimizing lineups to ensure they have the best team on the floor in the final seconds of a big game, or stressing teamwork and cooperation during tight deadlines, outages or other time-sensitive situations. Coaches and data center managers play a similar role to ensure their team (or infrastructure) is ready to perform when it matters most.To read this article in full or to leave a comment, please click here

FIRST LOOK: The Samsung Galaxy S8 smartphone

Halt and (don’t) catch fireImage by SamsungThis April 21, you can lay your hands – safely this time – on Samsung’s latest flagship smartphones, the Galaxy S8 and S8 Plus. They’re both unsurprisingly impressive devices, and Samsung’s going to be hoping that they can restore the company’s fortunes in the wake of the Note 7 debacle and legal troubles at home, and in advance of Apple’s anticipated iPhone 8 or iPhone X release later this year. Check it out.To read this article in full or to leave a comment, please click here

Trojan source code leak poised to spur new online banking attacks

The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500. It can steal and inject information from and into websites opened in Mozilla Firefox, Internet Explorer and Google Chrome and can also open a local proxy or hidden remote desktop service.These are all features commonly seen in banking Trojans, as they're used by attackers to bypass the security checks of online bank websites to perform fraud. For example, the proxy and remote desktop functionality allows hackers to initiate rogue transactions through the victims' browsers after they have been tricked into providing the second authentication factor.To read this article in full or to leave a comment, please click here

Trojan source code leak poised to spur new online banking attacks

The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500. It can steal and inject information from and into websites opened in Mozilla Firefox, Internet Explorer and Google Chrome and can also open a local proxy or hidden remote desktop service.These are all features commonly seen in banking Trojans, as they're used by attackers to bypass the security checks of online bank websites to perform fraud. For example, the proxy and remote desktop functionality allows hackers to initiate rogue transactions through the victims' browsers after they have been tricked into providing the second authentication factor.To read this article in full or to leave a comment, please click here

Kubernetes networking 101 – Pods

Some time ago I wrote a post entitled ‘Kubernetes networking 101‘.  Looking at the published date I see that I wrote that more than 2 years ago!  That being said – I think it deserves a refresher.  The time around, Im going to split the topic into smaller posts in the hopes that I can more easily maintain them as things change.  In today’s post we’re going to cover how networking works for Kubernetes pods.  So let’s dive right in!

In my last post – I described a means in which you can quickly deploy a small Kubernetes cluster using Ansible.  I’ll be using that environment for all of the examples shown in these posts.  To refresh our memory – let’s take another quick look at the topology…

The lab consists of 5 hosts with ubuntu-1 acting as the Kubernetes master and the remaining nodes acting as Kubernetes minions (often called nodes now but I cant break the habit).  At the end of our last post we had what looked like a working Kubernetes cluster and had deployed our first service and pods to it.  Prior to deploying to the cluster we had to add some routing in the form Continue reading

Microsoft’s Surface Book and Surface Studio will ship in more markets

Microsoft has been cautious about making its Surface product line available worldwide. It tests devices in specific markets, sees how they do, and if the response is good, ships them to those areas.The company appears to have have received a strong response, in particular, to its Surface Studio, Surface Book devices and Surface Dial, which will soon be available in many Asian and European countries.The expanded availability of these devices was announced on the same day Microsoft said it would release Windows 10 Creators Update on April 11.The Surface Book with Performance Base, one of the devices that will be more broadly available, is a high-performance laptop that can also be a tablet. The screen pops out from the keyboard base to be a tablet. In a review, PC World concluded the device was powerful and easy to use, but had some design issues and was heavy.To read this article in full or to leave a comment, please click here

What it takes to become an information assurance analyst

After spending 13 years working in systems administration and network and desktop support, Simeon Holloway had reached a crossroads in his career.“I had capped out on the knowledge” required for the positions, Holloway says. “Salary-wise, I was capping out, too. I wanted to move in a different direction — something challenging and that was in high demand.” Cybersecurity was at the top of his list. In 2014, he set out on a self-guided journey toward a new career. Today, Holloway is an information assurance analyst for the Georgia Lottery in Atlanta. download What it takes to become an information assurance analyst CSO Online Getting serious about security While still a senior systems administrator for the Centers for Disease Control, Holloway kicked into overdrive, spending his evenings and weekends researching cybersecurity online. “I watched YouTube videos, joined webinars, things like that,” Holloway says. He spent four months studying for and earning his CompTIA Security+ certification, and attended a five-day Certified Ethical Hacker Bootcamp course that helped him get his CEH certification six months later. “I also built my own virtual lab — taking some of the free cyber tools available online, like BackTrack and Kali Linux, and practiced pen testing,” Continue reading

IDG Contributor Network: How to test SD-WANs

Whenever I speak with companies starting to research SD-WANs, the question about testing invariably comes up. Like probably any enterprise device, SD-WANs are filled with features. And as with any major WAN acquisition, testing those features prior to purchase is incredibly important. SD-WAN vendors have their own nuances and strengths. You need to be sure those strengths align with your environment.RELATED: SD-WAN: What it is and why you will use it one day As an edge device, there’s very little in terms of packet processing that needs to be tested in an SD-WAN node. But that doesn’t mean SD-WAN node testing isn’t important. Here are some tips for what you can look for when running your proof of concept (POC) from my buddy DC Palter, CEO at network testing simulator company Apposite Technologies, and our experiences here at SD-WAN Experts.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to test SD-WANs

Whenever I speak with companies starting to research SD-WANs, the question about testing invariably comes up. Like probably any enterprise device, SD-WANs are filled with features. And as with any major WAN acquisition, testing those features prior to purchase is incredibly important. SD-WAN vendors have their own nuances and strengths. You need to be sure those strengths align with your environment.RELATED: SD-WAN: What it is and why you will use it one day As an edge device, there’s very little in terms of packet processing that needs to be tested in an SD-WAN node. But that doesn’t mean SD-WAN node testing isn’t important. Here are some tips for what you can look for when running your proof of concept (POC) from my buddy DC Palter, CEO at network testing simulator company Apposite Technologies, and our experiences here at SD-WAN Experts.To read this article in full or to leave a comment, please click here

IBM on the state of network security: Abysmal

The state of online security is darn dreadful. At least if you look at the results from the IBM Security’s 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as: The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years. In one case, a single source leaked more than 1.5 billion records [see Yahoo breach]. In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year. In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised. The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware. In December 2016, a malware developer with an ongoing banking Trojan Continue reading

IBM on the state of network security: Abysmal

The state of online security is darn dreadful. At least if you look at the results from the IBM Security’s 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as: The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years. In one case, a single source leaked more than 1.5 billion records [see Yahoo breach]. In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year. In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised. The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware. In December 2016, a malware developer with an ongoing banking Trojan Continue reading

25% off HotLogic Mini Personal Portable Oven – Deal Alert

Hot Logic Mini averages 4.8 out of 5 stars on Amazon from over 1,800 people (87% rate a full 5 stars: read recent reviews).  A cross between a lunch bag and an oven, this personal, portable cooker is great for the office, job site, the campsite, the car, or anywhere you have an outlet. The Hot Logic Mini will prepare fresh-cooked hot meals, reheated meals or perfectly cooked prepackaged meals without overcooked edges or frozen centers. Whether you're cooking uncooked, frozen chicken breasts with fresh beans on top or reheating last night's pizza, HotLogic will cook it and hold its temperature until you're ready to eat. Its typical list price of $39.95 has been reduced, for now, to $29.95. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Amazon’s successful drone delivery test doesn’t really prove anything

Last week, Amazon Prime Air released dramatic video of a drone delivering bottles of sunscreen in a test at Amazon's MARS conference in a controlled environment at Palm Springs International Airport in California.Pretty cool stuff, even if the company has already demonstrated the ability to complete actual commercial drone deliveries in the United Kingdom. But my longstanding skepticism for the practicality of drone deliveries hasn’t diminished. More than two years ago, for example, I listed 10 reasons Amazon's drone delivery plan still won't fly.To read this article in full or to leave a comment, please click here

Invisibility, teleportation among top superpowers that IT pros want

Against my better judgment, I'm going to share a few tidbits from a vendor survey — one of those marketing schemes that have become the bane of my existence as a tech journalist (See: "Right back at you vendors: OUR independent study of YOUR independent research")But I figured you'd want to know what superpowers your peers desire, since I'm sure that's a discussion you and your colleagues have had at some point or another (my superpower would be to dodge vendor survey pitches).To read this article in full or to leave a comment, please click here