Archive

Category Archives for "Networking"

Facial recognition in public restroom required if you want toilet paper

When you gotta go, you gotta go, but there may be a line in public restrooms. Usually those lines don’t have anything to do with surveillance. Let’s hope a new biometric authentication trial in China doesn’t roll out here, or else you would have to stop in public bathrooms in front of a device that uses facial recognition and wait for your allotted amount of toilet paper to be dispensed. Too bad, so sad if the 24-inch strip of toilet paper isn’t enough. The dispenser will not spit out more paper to the same person until after nine minutes have passed. Why would this creepy type of surveillance be deployed in public restrooms? To combat toilet paper theft.To read this article in full or to leave a comment, please click here

63% off Anker Quick Charge 3.0 39W Dual USB Car Charger – Deal Alert

Dual ports pump out 39W of power to simultaneously charge power-hungry USB devices at full speed. Charge compatible devices up to 80% in just 35 minutes with Quick Charge 3.0. Patented PowerIQ and VoltageBoost deliver high-speed charging to non-Quick Charge devices. Anker's Quick Charge Dual USB Car Charger is discounted right now to just $21.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Datanauts 076: Understanding AWS Vs. Azure

The Datanauts talk with Eric Shanks about the differences between AWS and Azure, how organizations choose a public cloud provider, the reasons application architecture are so critical, and how to deal with worries about cloud lock-in. The post Datanauts 076: Understanding AWS Vs. Azure appeared first on Packet Pushers.

US lawmakers question police use of facial recognition tech

Reacting to concerns about the mass collection of photographs in police databases, U.S. lawmakers plan to introduce legislation to limit the use of facial recognition technology by the FBI and other law enforcement organizations.The FBI and police departments across the country can search a group of databases containing more than 400 million photographs, many of them from the drivers' licenses of people who have never committed a crime. The photos of more than half of U.S adults are contained in a series of FBI and state databases, according to one study released in October.To read this article in full or to leave a comment, please click here

US lawmakers question police use of facial recognition tech

Reacting to concerns about the mass collection of photographs in police databases, U.S. lawmakers plan to introduce legislation to limit the use of facial recognition technology by the FBI and other law enforcement organizations.The FBI and police departments across the country can search a group of databases containing more than 400 million photographs, many of them from the drivers' licenses of people who have never committed a crime. The photos of more than half of U.S adults are contained in a series of FBI and state databases, according to one study released in October.To read this article in full or to leave a comment, please click here

Video: Software Secures the World

Martin Casado doesn’t have a proper job since he left VMware. This gives him times to think deeply about the future of IT security as part of his role of wasting investors money at A16Z and considering where the next advances or futures will be. This video makes a lot of sense to me.

Once upon a time, we thought of security measures as being built like a wall around a medieval city. Then, as threats grew in complexity, we began to think of it more like securing a city or nation-state. Finally, security grew alike to aerial warfare — mobile, quick, wide-ranging. Each of these new modes for thinking about security represented a major misalignment between the security threats that had evolved and our strategies/tactics for dealing with them.
Now we are once again at another such major misalignment — thanks largely to the cloud and new complexity — requiring both a shift in how we think about and respond to threats. But we also have security “overload” given the vast size of our systems and scale of notifications.
How do security threats develop? How should CEOs and CSOs think of planning for them? What role will AI and Continue reading

Container Namespaces – How to add networking to a docker container

I've discussed how we can network a docker container directly with the host's networking stack bypassing docker0, the default bridge docker creates for you. That method involves asking docker to create a port on a user defined bridge and from the inside configuring the container to ask for an IP by DHCP. A more advanced way of achieving this is to bring up a docker container without networking and later configure the stack out-of-band of docker. This approach is one of the methods used by Calico for example to network containers and I've spoken about that here.

Today, lets deep dive into adding interfaces to a container manually and in-turn gain some insight into how all of this works. Since this discussion is going to revolve around network namespaces I assume you have some background in that area. If you are new to the concept of namespaces and network namespaces,  I recommend reading this.


Step 1: We will first bring up a docker container without networking. From docker docs, using the --network none when running a docker container leaves out container interface creation for that docker instance. Although docker skips network interface creation it brings up the container with Continue reading

Why Apple dropped iPad’s price to lowest yet

Apple this week is releasing its most affordable iPad to date. The refreshed 9.7-inch iPad, which packs a Retina screen and Apple’s A9 chip in a device that effectively replaces the iPad Air 2, is priced at $329 with 32GB of storage.The $70 price drop makes the entry-level iPad more competitive, particularly among schools that can now snag the tablet for under $300 at educational pricing. Businesses that are motivated by price and don’t require more advanced features in the iPad Pro will also be giving the iPad another look as a result of these changes, according to Avi Greengart, research director at GlobalData.To read this article in full or to leave a comment, please click here

Microsoft hit with second cloud disruption in two weeks

A handful of hosted Microsoft services, including Office 365 SaaS apps, OneDrive cloud storage and xBox Live platforms experienced an outage on Tuesday into Wednesday, according to Microsoft and services that track outages.DownDetector.com found that Office 365 had elevated reported error rates on Tuesday afternoon ET. It’s unclear which Office 365 services or how many users were impacted though.Microsoft confirmed on its @xBoxSupport Twitter account that customers were having trouble signing into the service on Tuesday evening ET. As of Wednesday morning ET, Microsoft reports that its OneDrive cloud storage system is experiencing error rates with some customers not being able to sign into the service.To read this article in full or to leave a comment, please click here

Stop using password manager browser extensions

It's been over a year since I presented on LostPass at ShmooCon, and in that time, many more bugs have been found in password managers. The most severe of which are in browser-based password managers extensions such as LastPass. Tavis Ormandy yesterday demonstrated a remote code execution on the latest LastPass version. This isn't the first extremely severe bug he's found in LastPass, either; there've been so many extremely severe bugs in LastPass it would be tedious to list them out. But LastPass isn't alone: Keeper, Dashlane and even 1Password have had severe vulnerabilities that allowed attackers to steal all of the passwords in a user's account without their knowledge.To read this article in full or to leave a comment, please click here

Stop using password manager browser extensions

It's been over a year since I presented on LostPass at ShmooCon, and in that time, many more bugs have been found in password managers. The most severe of which are in browser-based password managers extensions such as LastPass. Tavis Ormandy yesterday demonstrated a remote code execution on the latest LastPass version. This isn't the first extremely severe bug he's found in LastPass, either; there've been so many extremely severe bugs in LastPass it would be tedious to list them out. But LastPass isn't alone: Keeper, Dashlane and even 1Password have had severe vulnerabilities that allowed attackers to steal all of the passwords in a user's account without their knowledge.To read this article in full or to leave a comment, please click here

Double Agent attack can turn antivirus into malware

A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.Based on a 15-year-old feature in Windows from XP through Windows 10, the attack is effective against all 14 antivirus products tested by security vendor Cybellum – and would also be effective against pretty much every other process running on the machines.Double Agent was discovered by Cybellum researchers and has not been seen in the wild.“The attack was reported to all the major vendors which approved the vulnerability and are currently working on finding a solution and releasing a patch,” according to a Cybellum blog. All the vendors were notified more than 90 days ago, which is the standard length of time for responsibly disclosing vulnerabilities and giving vendors time to fix them.To read this article in full or to leave a comment, please click here

Double Agent attack can turn antivirus into malware

A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.Based on a 15-year-old feature in Windows from XP through Windows 10, the attack is effective against all 14 antivirus products tested by security vendor Cybellum – and would also be effective against pretty much every other process running on the machines.Double Agent was discovered by Cybellum researchers and has not been seen in the wild.“The attack was reported to all the major vendors which approved the vulnerability and are currently working on finding a solution and releasing a patch,” according to a Cybellum blog. All the vendors were notified more than 90 days ago, which is the standard length of time for responsibly disclosing vulnerabilities and giving vendors time to fix them.To read this article in full or to leave a comment, please click here

64% off MOTA JETJAT Ultra Mini Drone with One Touch Take-Off & Landing – Deal Alert

Experience first class flight with auto landing, takeoff, and hover with the push of a button, features never before seen in mini drones. ULTRA is smartphone ready – allowing a connection with your phone through Wi-Fi or remote control for crystal-clear video and photos. Use your phone as a display with the remote or complete flight control. The list price on the MOTA JETJAT mini drone has been reduced to just $47.38. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Is a 4G hot spot still needed in today’s world?

Maybe my experiences are different from those who travel more often, but I’ve been finding that the need for a Wi-Fi personal hot spot that connects to a 3G or 4G wireless network has diminished as more locations are providing their own Wi-Fi with a backhaul to a faster connection. Hotels, coffee shops, even airports seem to offer faster networking options than those provided by some of these devices. Granted, a lot of these places come with a price tag for the access, with some at outrageous prices. If you aren’t being reimbursed by your company for that access, finding less expensive Internet access can be tricky. Even the “free” ones cost in terms of having to watch an ad, or they limit your speed to basic functions such as downloading email or basic web surfing (don’t even think about streaming Netflix or uploading video).To read this article in full or to leave a comment, please click here

Trello connects to HipChat, BitBucket, Jira and Confluence

Trello is getting hooked into the entire Atlassian ecosystem with a series of integrations unveiled Wednesday. The new “power-ups” for the project management software connect it with BitBucket, Jira, HipChat and Confluence, to help customers get their work done more efficiently.Using Trello is supposed to help people keep their projects organized. The service lets people lay out virtual cards in columns on a workspace known as a board. Doing so can help with things like tracking the status of software bugs or tracking contracts through different stages of completion.Each of the connections announced Wednesday is supposed to help with the process of using Trello. Confluence users can now tie cards to new pages in Atlassian’s content management system, Jira users can connect issues from the bug tracker with cards and BitBucket users can better organize their code.To read this article in full or to leave a comment, please click here

Inventor of new lithium-ion battery responds to skepticism

The inventor of a new lithium-ion (Li-on) technology that is purported to be safer, faster-charging, and longer-lasting than today's rechargeable batteries responded to experts wary of his claim, saying new discoveries invite strong skepticism.John Goodenough, 94, a professor in the Cockrell School of Engineering at the University of Texas at Austin and co-inventor of the original lithium-ion battery, this week said he demonstrated new battery cells that have at least three times as much energy density as today's Li-on batteries. Creative Commons Lic. The lithium-ion battery in a Nissan Leaf.To read this article in full or to leave a comment, please click here