Archive

Category Archives for "Networking"

Double Agent attack can turn antivirus into malware

A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.Based on a 15-year-old feature in Windows from XP through Windows 10, the attack is effective against all 14 antivirus products tested by security vendor Cybellum – and would also be effective against pretty much every other process running on the machines.Double Agent was discovered by Cybellum researchers and has not been seen in the wild.“The attack was reported to all the major vendors which approved the vulnerability and are currently working on finding a solution and releasing a patch,” according to a Cybellum blog. All the vendors were notified more than 90 days ago, which is the standard length of time for responsibly disclosing vulnerabilities and giving vendors time to fix them.To read this article in full or to leave a comment, please click here

Double Agent attack can turn antivirus into malware

A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.Based on a 15-year-old feature in Windows from XP through Windows 10, the attack is effective against all 14 antivirus products tested by security vendor Cybellum – and would also be effective against pretty much every other process running on the machines.Double Agent was discovered by Cybellum researchers and has not been seen in the wild.“The attack was reported to all the major vendors which approved the vulnerability and are currently working on finding a solution and releasing a patch,” according to a Cybellum blog. All the vendors were notified more than 90 days ago, which is the standard length of time for responsibly disclosing vulnerabilities and giving vendors time to fix them.To read this article in full or to leave a comment, please click here

64% off MOTA JETJAT Ultra Mini Drone with One Touch Take-Off & Landing – Deal Alert

Experience first class flight with auto landing, takeoff, and hover with the push of a button, features never before seen in mini drones. ULTRA is smartphone ready – allowing a connection with your phone through Wi-Fi or remote control for crystal-clear video and photos. Use your phone as a display with the remote or complete flight control. The list price on the MOTA JETJAT mini drone has been reduced to just $47.38. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Is a 4G hot spot still needed in today’s world?

Maybe my experiences are different from those who travel more often, but I’ve been finding that the need for a Wi-Fi personal hot spot that connects to a 3G or 4G wireless network has diminished as more locations are providing their own Wi-Fi with a backhaul to a faster connection. Hotels, coffee shops, even airports seem to offer faster networking options than those provided by some of these devices. Granted, a lot of these places come with a price tag for the access, with some at outrageous prices. If you aren’t being reimbursed by your company for that access, finding less expensive Internet access can be tricky. Even the “free” ones cost in terms of having to watch an ad, or they limit your speed to basic functions such as downloading email or basic web surfing (don’t even think about streaming Netflix or uploading video).To read this article in full or to leave a comment, please click here

Trello connects to HipChat, BitBucket, Jira and Confluence

Trello is getting hooked into the entire Atlassian ecosystem with a series of integrations unveiled Wednesday. The new “power-ups” for the project management software connect it with BitBucket, Jira, HipChat and Confluence, to help customers get their work done more efficiently.Using Trello is supposed to help people keep their projects organized. The service lets people lay out virtual cards in columns on a workspace known as a board. Doing so can help with things like tracking the status of software bugs or tracking contracts through different stages of completion.Each of the connections announced Wednesday is supposed to help with the process of using Trello. Confluence users can now tie cards to new pages in Atlassian’s content management system, Jira users can connect issues from the bug tracker with cards and BitBucket users can better organize their code.To read this article in full or to leave a comment, please click here

Inventor of new lithium-ion battery responds to skepticism

The inventor of a new lithium-ion (Li-on) technology that is purported to be safer, faster-charging, and longer-lasting than today's rechargeable batteries responded to experts wary of his claim, saying new discoveries invite strong skepticism.John Goodenough, 94, a professor in the Cockrell School of Engineering at the University of Texas at Austin and co-inventor of the original lithium-ion battery, this week said he demonstrated new battery cells that have at least three times as much energy density as today's Li-on batteries. Creative Commons Lic. The lithium-ion battery in a Nissan Leaf.To read this article in full or to leave a comment, please click here

L.A. and NYC still rank behind smaller cities in wireless performance

The two biggest cities in the U.S. -- New York City and Los Angeles -- continue to rank well below many smaller U.S. cities in overall wireless performance, according to millions of field tests performed by RootMetrics in the second half of 2016.The New York metro area, with 18 million people, ranked just 66th in the latest round of tests of the nation's largest 125 metro areas. Meanwhile, L.A., with 12.1 million people, ranked 49th. In testing done by RootMetrics in the first half of last year, New York finished 59th, L.A., 99th.[ Further reading: The votes are in: Which mobile data provider is best? ] L.A. improved in two of six measurements: call and data performance. New York's drop was largely driven by a "steep decline" in network speed and data performance, RootMetrics said.To read this article in full or to leave a comment, please click here

5 ways to speed up Chrome: Tips for power users and newbies

Chrome is already the most popular and powerful browser for your PC, but you may be missing out on more ways to improve your experience. Delve into Chrome’s massive extensions library or tinker with under-the-hood features, and see how you can enjoy smarter, faster browsing.Chrome has a considerable network of extensions, some of which can be found in the Chrome Web Store, while others are available from particular providers. For the most part, extensions, err, extend what your browser can do, connecting to your favorite services so you can do most of your work in Chrome and get it done faster.To read this article in full or to leave a comment, please click here

How to fix five Windows 10 headaches

Microsoft Windows 10 has gone a long way towards fixing the problems that were endemic with earlier versions of Windows -- notably Windows 8. But it's still far from a perfect operating system and has its share of headaches.4. Recover lost storage spaceTo read this article in full or to leave a comment, please click here(Insider Story)

Review: SaltStack shifts devops into high gear

The only sane and efficient way to manage a large numbers of servers—or even a few dozen, if they change often—is through automation. Automation tools have to be learned and mastered, so they exact a significant up-front cost, but they dramatically reduce the administrative burden in the long run. Perhaps most important, they provide a staunch line of defense against the fatal fat-fingered mistake, which even the most sophisticated cloud operators struggle to avoid.Ease of use. Configuration management is simple with SaltStack. Because Salt uses the YAML configuration format, states are can be written quickly and easily. YAML state descriptions are structured well, with solid readability. The support for Mako, JSON, Wempy, and Jinja allows developers to extend Salt’s capabilities. The availability of built-in modules makes it easy to configure and manage states.To read this article in full or to leave a comment, please click here(Insider Story)

Review: SaltStack shifts devops into high gear

The only sane and efficient way to manage a large numbers of servers—or even a few dozen, if they change often—is through automation. Automation tools have to be learned and mastered, so they exact a significant up-front cost, but they dramatically reduce the administrative burden in the long run. Perhaps most important, they provide a staunch line of defense against the fatal fat-fingered mistake, which even the most sophisticated cloud operators struggle to avoid.Ease of use. Configuration management is simple with SaltStack. Because Salt uses the YAML configuration format, states are can be written quickly and easily. YAML state descriptions are structured well, with solid readability. The support for Mako, JSON, Wempy, and Jinja allows developers to extend Salt’s capabilities. The availability of built-in modules makes it easy to configure and manage states.To read this article in full or to leave a comment, please click here(Insider Story)

How AI, machine learning will impact tech recruiting

Artificial intelligence and machine learning already make a huge impact on the way we watch movies and television, shop, and travel, but how will these new technology advancements affect you as a sourcing or recruiting professional?It all comes down to being able to quickly analyze huge amounts of data and make decisions and predictions based on that, says Summer Husband, senior director, data science, at Randstad Sourceright, in a presentation at SourceCon, in Anaheim, Calif, last week.To read this article in full or to leave a comment, please click here

10 greatest inside security risks

Internal threatsImage by ThinkstockLast year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access, says Sam Elliott, director of security product management at Bomgar. Elliott warns that these 10 employees could be your greatest internal security threat.To read this article in full or to leave a comment, please click here

10 greatest inside security risks

Internal threatsImage by ThinkstockLast year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access, says Sam Elliott, director of security product management at Bomgar. Elliott warns that these 10 employees could be your greatest internal security threat.To read this article in full or to leave a comment, please click here

Critical infrastructure: Off the web, out of danger?

The debate over the chances of a catastrophic cyber attack taking down a major part of the nation’s critical infrastructure (CI) has been ongoing for a generation.But it hasn’t been settled – in some ways it is more intense now than ever.On one side are those, including high government officials, who warn of a “cyber Pearl Harbor” that could leave swaths of the country in darkness and cold – without electric power – for months.Retired Adm. James Stavridis, dean at Tufts Fletcher School and a former NATO supreme allied commander, used that term just three months ago, saying such an attack would be aimed either at the electrical grid or the financial sector.To read this article in full or to leave a comment, please click here

Critical infrastructure: Off the web, out of danger?

The debate over the chances of a catastrophic cyber attack taking down a major part of the nation’s critical infrastructure (CI) has been ongoing for a generation.But it hasn’t been settled – in some ways it is more intense now than ever.On one side are those, including high government officials, who warn of a “cyber Pearl Harbor” that could leave swaths of the country in darkness and cold – without electric power – for months.Retired Adm. James Stavridis, dean at Tufts Fletcher School and a former NATO supreme allied commander, used that term just three months ago, saying such an attack would be aimed either at the electrical grid or the financial sector.To read this article in full or to leave a comment, please click here

The first and only NOS to support LinkedIn’s Open19 project

Today we are excited to announce our support of Open19, a project spearheaded by LinkedIn. Open19 simplifies and standardizes the 19-inch rack form factor and increases interoperability between different vendors’ technology. Built on the principles of openness, Open19 allows many more suppliers to produce servers that will interoperate and will be interchangeable in any rack environment.

We are thrilled to be the first and only network operating system supporting Open19 for two reasons. First, this joint solution offers complete choice throughout the entire stack — increasing interoperability and efficiency. We believe the ease of use of this new technology helps expand the footprint of web-scale networking and makes it even more accessible and relevant.

The second reason is that we are continually dedicated to innovation within the open community, and this is one more way we can support that mission. We believe that disaggregation is not only the future but the present (read more about why we think disaggregation is here to stay). When a company like LinkedIn jumped into the disaggregate ring, we knew we wanted to be a part of it.

What is Open19?

The primary component, Brick Cage, is a passive mechanical cage that fits Continue reading