Archive

Category Archives for "Networking"

39% off Vastar Professional Breathalyzer Digital Breath Alcohol Tester – Deal Alert

The Vastar breathalyzer is used to measure the concentration of alcohol in the human body. With a sensitive semi-conductor sensor, it takes only 5 seconds to show whether you can drive or not after drinking. It will show you high accuracy test results (up to 0.01mg/l). Four units of measurement can be converted (%BAC , ‰BAC, mg/l, mg/100ml). This breathalyzer is space-saving, lightweight and portable. Just put it in your pocket.  With the current 39% off deal you can pick it up for just $18.99, a significant discount from its typical $32.99 list price.  See the Vastar breathalyzer on Amazon.To read this article in full or to leave a comment, please click here

Raspberry Pi 3 gets Microsoft Cortana with Windows 10 Creators Update

You will very soon be able to use Microsoft's Cortana voice assistant with the Raspberry Pi 3 and make cool devices that can accept voice commands.But for that, you'll need to upgrade the popular developer board, which can run Windows 10 IoT Core, to the Creators Update of the OS.You'll be able to use Cortana on Raspberry Pi similar to the way it works on PCs. You'll be able to ask for weather, time, traffic, or stock prices.Users will also able to build smart devices using Raspberry Pi 3 that will be able to accept Cortana's commands. But the devices will need to be based on Windows 10 IoT Core, not Linux-based OSes.Customized commands can be programmed for devices and could be related to reminders, look-ups, mapping, events, news, dictionary, and other "skills." To read this article in full or to leave a comment, please click here

Latest Shadow Brokers exploit dump poses little threat

A group of hackers that has been trying to sell exploits and malware allegedly used by the U.S. National Security Agency decided to make the data available for free over the weekend.The security community was expecting the password-encrypted archive that the Shadow Brokers group unlocked Saturday to contain previously unknown and unpatched exploits -- known in the industry as zero-days. That was not the case.As researchers started to analyze the exploits inside, it became clear that while some of them were technically interesting, the large majority were for old and publicly known vulnerabilities. Some appeared to have actually been sourced from public information and affect software versions that are several years old.To read this article in full or to leave a comment, please click here

Latest Shadow Brokers exploit dump poses little threat

A group of hackers that has been trying to sell exploits and malware allegedly used by the U.S. National Security Agency decided to make the data available for free over the weekend.The security community was expecting the password-encrypted archive that the Shadow Brokers group unlocked Saturday to contain previously unknown and unpatched exploits -- known in the industry as zero-days. That was not the case.As researchers started to analyze the exploits inside, it became clear that while some of them were technically interesting, the large majority were for old and publicly known vulnerabilities. Some appeared to have actually been sourced from public information and affect software versions that are several years old.To read this article in full or to leave a comment, please click here

35% off Universal Waterproof Dry Phone Bag for Devices, 3-Pack – Deal Alert

Bring your phone and use it when you go swimming in the summer or skiing in the winter.  This waterproof bag (3-pack), currently discounted by 35% on Amazon from $19.99 down to just $12.99.  Great for using during outdoor activities including boating and swimming. It's flexible clear waterproof bag allows you to use your smartphone while keeping it safe and secure in the bag. They are IPX8 Certificated: Fully submersible and waterproof, it is designed for extreme condition. For more information and buying options, see the discounted waterproof bag on Amazon.To read this article in full or to leave a comment, please click here

Could Amazon become an enterprise collaboration contender?

Microsoft has for decades owned the intersection of collaboration, productivity and communication. However, as these services shifted to the cloud, it opened pathways for greater competition and flexibility in how organizations deployed applications for their workforce. Through G Suite, Google has stretched its resources and refined its family of apps for enterprise. The market is far from locked up, however, and analysts see at least some room for new players to emerge to challenge Google and Microsoft.Could Amazon be the dark horse of enterprise collaboration? The company has a dominating position in cloud-based infrastructure, but its moves in the application market, albeit reserved, have yet to deliver similar impact. But what if it decides to focus on the collaboration market?To read this article in full or to leave a comment, please click here

US FCC kills plan to allow mobile phone conversations on flights

Imagine a fellow airplane passenger sitting next to you and yelling into his mobile phone for six hours during a cross-country flight.If simply thinking about that scenario gives you a headache, you're not alone. On Monday, the U.S. Federal Communications Commission killed a plan to allow mobile phone calls during commercial airline flights.Since 2013, the FCC and the Federal Aviation Administration have considered allowing airline passengers to talk on the phones during flights, although the FAA also proposed rules requiring airlines to give passengers notice if they planned to allow phone calls.To read this article in full or to leave a comment, please click here

NANOG 70 Hackathon

Sunday, June 4, 2017

 

Welcome to the NANOG 70 Hackathon brought to you by NANOG and hackathon host sponsor

Join us for the NANOG 70 Hackathon -- a one-day event Sunday, June 4, 2017, at the Hyatt Regency Bellevue.

 

The NANOG 70 Hackathon will bring network operators together in a room to develop new ideas and hacks for automating production internet networks.  Tools and software beyond those provided by vendors and existing open-source projects are needed to keep those networks up and running. By gathering together at NANOG 70 to collaboratively hack on code or hardware, develop ideas, and documentation we can open the possibilities of peering automation.  And we will have fun while doing it!

 

Registration for the Hackathon is open on a space-available basis to all interested attendees of NANOG 70.  All skill levels are welcome and participants are expected to actively participate in the hacks.   Hackathon participants will be automatically added to an email list after registration is complete in order to receive information and updates. At the end of the hack participating teams will be given the opportunity to briefly present their ideas and determine the top 3 teams.  Lightning talks may be Continue reading

Microsoft buys open-source container developer Deis

Microsoft today announced it is acquiring Deis, a company that has been building open-source tools for rapid and easy creation and management of applications on Kubernetes, the open-source container cluster manager for automated deployment, scaling and management of containerized applications. This is not Microsoft’s first foray into containers. It announced plans to work with Google, which created Kubernetes before turning it over to a consortium, back in 2014. In February of this year, Microsoft made Kubernetes generally available on its own Azure Container Service.+ Also on Network World: Containers: IT history seems to be repeating itself + Containers are an alternative to virtual machines in that they let organizations build, deploy and move applications to and from the cloud without a full virtual machine. Containers have a much smaller footprint and thus take up fewer resources.To read this article in full or to leave a comment, please click here

Mastodon—The free software, decentralized Twitter competitor

My life is filled with conundrums.One of those conundrums is the fact that I spend a huge amount of my time promoting and advocating free and open-source software. Yet in order to reach a large audience with that advocacy, I end up needing to use social networks (such as Twitter and Google Plus) which are—not free software.If I'm going to be speaking at a conference about GNU, Linux and other free software-y topics, I announce it on Twitter. And, perhaps rightly so, my freedom-loving friends toss a little (usually good-natured) mockery my way for doing so.Over the years, a few social networks have sprung up that are a bit more free software-based—or, at least, open source. Yet none of them has really captured the interest of the broader public—something necessary for what I do. Diaspora is a great example of one that showed great promise but never really took off. (It still exists, but without the audience numbers and/or growth that is needed.) To read this article in full or to leave a comment, please click here

DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification

In an IT world where security software patches seem to be a dime a dozen, the researchers at the Defense Advanced Research Projects Agency want to take a different approach – bake cybersecurity right into the circuitry.The research outfit will this month detail a new program called System Security Integrated Through Hardware and Firmware (SSITH) that has as one of its major goals to develop new integrated circuit architectures that lack the current software-accessible points of criminal entry, yet retain the computational functions and high-performance the integrated circuits were designed to deliver. Another goal of the program is the development of design tools that would become widely available so that hardware-anchored security would eventually become a standard feature of integrated circuit in both Defense Department and commercial electronic systems, DARPA stated.To read this article in full or to leave a comment, please click here

DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification

In an IT world where security software patches seem to be a dime a dozen, the researchers at the Defense Advanced Research Projects Agency want to take a different approach – bake cybersecurity right into the circuitry.The research outfit will this month detail a new program called System Security Integrated Through Hardware and Firmware (SSITH) that has as one of its major goals to develop new integrated circuit architectures that lack the current software-accessible points of criminal entry, yet retain the computational functions and high-performance the integrated circuits were designed to deliver. Another goal of the program is the development of design tools that would become widely available so that hardware-anchored security would eventually become a standard feature of integrated circuit in both Defense Department and commercial electronic systems, DARPA stated.To read this article in full or to leave a comment, please click here

Reaction: Mend, don’t end, the IETF

Is it time for the IETF to give up? Over at CircleID, Martin Geddes makes a case that it is, in fact, time for the IETF to “fade out.” The case he lays out is compelling—first, the IETF is not really an engineering organization. There is a lot of running after “success modes,” but very little consideration of failure modes and how they can and should be guarded against. Second, the IETF “the IETF takes on problems for which it lacks an ontological and epistemological framework to resolve.”

In essence, in Martin’s view, the IETF is not about engineering, and hasn’t ever really been.

The first problem is, of course, that Martin is right. The second problem is, though, that while he hints at the larger problem, he incorrectly lays it at the foot of the IETF. The third problem is the solutions Martin proposes will not resolve the problem at hand.

First things first: Martin is right. The IETF is a mess, and is chasing after success, rather than attending to failure. I do not think this is largely a factor of a lack of engineering skill, however—after spending 20 years working in the IETF, there Continue reading

Mac Flooding Attack , Port Security and Deployment Considerations

This article is the 4th in Layer 2 security series. We will be discussing a very common layer 2 attack which is MAC flooding and its TMtigation “Port Security MAC limiting” If you didn’t read the previous 3 articles; DHCP snooping, Dynamic ARP Inspection, and IP Source Guard; I recommend that you take a quick […]

The post Mac Flooding Attack , Port Security and Deployment Considerations appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.