Archive

Category Archives for "Networking"

Healthcare records for sale on Dark Web

Last August a Baltimore substance abuse treatment facility had its database hacked. Patient records subsequently found their way onto the Dark Web, according to DataBreaches.net. The group noticed such things as dates of admission, whether the patients are on methadone, their doctors and counselors, and dosing information.In the DataBreaches.net blog, the hacker “Return,” who they think is Russian, described how he compromised the Man Alive clinic: “With the help of the social engineer, applied to one of the employees. Word file with malicious code was downloaded.”To read this article in full or to leave a comment, please click here

Securing risky network ports

Data packets travel to and from numbered network ports associated with particular IP addresses and endpoints, using the TCP or UDP transport layer protocols. All ports are potentially at risk of attack. No port is natively secure.“Each port and underlying service has its risks. The risk comes from the version of the service, whether someone has configured it correctly, and, if there are passwords for the service, whether these are strong? There are many more factors that determine whether a port or service is safe,” explains Kurt Muhl, lead security consultant at RedTeam Security. Other factors include whether the port is simply one that attackers have selected to slip their attacks and malware through and whether you leave the port open.To read this article in full or to leave a comment, please click here

Securing risky network ports

Data packets travel to and from numbered network ports associated with particular IP addresses and endpoints, using the TCP or UDP transport layer protocols. All ports are potentially at risk of attack. No port is natively secure.“Each port and underlying service has its risks. The risk comes from the version of the service, whether someone has configured it correctly, and, if there are passwords for the service, whether these are strong? There are many more factors that determine whether a port or service is safe,” explains Kurt Muhl, lead security consultant at RedTeam Security. Other factors include whether the port is simply one that attackers have selected to slip their attacks and malware through and whether you leave the port open.To read this article in full or to leave a comment, please click here

6 leadership qualities to look for when hiring

Leadership qualities to look for when hiringImage by PexelsLeadership isn't confined to the C-suite. Companies increasingly look for solid leadership skills when adding to their workforce, whether the roles are entry-level or executive. Stephany Samuels, senior vice president of people strategy at IT recruiting and staffing firm Mondo, explains which qualities you should be looking for when hiring and how to identify the leaders in your talent pool.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Using Passpoint for private Wi-Fi networks

We normally think of Passpoint, the Wi-Fi Alliance certification, as a feature for Wi-Fi hotspots owned and operated by service providers. Passpoint enables comprehensive inter-carrier roaming, with discovery, authentication and accounting.But, as with any good protocol, the possible applications greatly outstrip the scenarios originally considered. Enterprise access points already support Passpoint. And as implementation in phones moves forward, slowly but surely non-carriers are finding interesting new applications.9 tips for speeding up your business Wi-Fi Passpoint’s big innovation is decoupling service advertising from the Service Set Identifier (SSID). An access point can advertise, in addition to its SSID, a number of service providers that provide roaming possibilities. When a device starts authentication, the access point relays to the respective service provider’s authentication server, then provides an internet connection.To read this article in full or to leave a comment, please click here

Survey Paints A Bleak Picture of the Current State of Trust Online

The 2017 CIGI-Ipsos Global Survey on Internet Security and Trust paints a bleak picture of the current state of trust online. A majority of those surveyed said they are more concerned about their privacy than the year before, with an almost even split between those “much more concerned” and those only “somewhat more concerned”. When asked whether they agree with the statement “overall, I trust the Internet”, only 12% of respondents strongly agreed and a further 43% somewhat agreed. This means only a little more than half agreed that they trust the Internet, and some even expressed some reservation by choosing to respond “somewhat agree”.

Sally Shipman Wentworth

Comparing Docker deployment options in public cloud

Few weeks back, I did a presentation in Container conference, Bangalore comparing different solutions available to deploy Docker in the public cloud. Slides are available here. I have also put the steps necessary along with short video for each of the options in the github page here. Abstract of the talk: Containers provide portability for … Continue reading Comparing Docker deployment options in public cloud

Trump claimed on Earth Day: ‘Rigorous science is critical to my administration’

If you had been living under a rock, then you might actually believe that President Trump plans to protect the environment and support science.Trump’s Earth Day statement began: Our Nation is blessed with abundant natural resources and awe-inspiring beauty. Americans are rightly grateful for these God-given gifts and have an obligation to safeguard them for future generations. My Administration is committed to keeping our air and water clean, to preserving our forests, lakes, and open spaces, and to protecting endangered species.To read this article in full or to leave a comment, please click here

Trump claimed on Earth Day: ‘Rigorous science is critical to my administration’

If you had been living under a rock, then you might actually believe that President Trump plans to protect the environment and support science.Trump’s Earth Day statement began: Our Nation is blessed with abundant natural resources and awe-inspiring beauty. Americans are rightly grateful for these God-given gifts and have an obligation to safeguard them for future generations. My Administration is committed to keeping our air and water clean, to preserving our forests, lakes, and open spaces, and to protecting endangered species.To read this article in full or to leave a comment, please click here

Sharing state between host and upstream network: LACP part 3

So far in the previous articles, we’ve covered the initial objections to LACP a deep dive on the effect on traffic patterns in an MLAG environment without LACP/Static-LAG. In this article we’ll explore how LACP differs from all other available teaming techniques and then also show how it could’ve solved a problem in this particular deployment.

I originally set out to write this as a single article, but to explain the nuances it quickly spiraled beyond that. So I decided to split it up into a few parts.
Part1: Design choices – Which NIC teaming mode to select

Part2: How MLAG interacts with the host
• Part3: “Ships in the night” – Sharing state between host and upstream network

Ships in the night

An important element to consider is LACP is the only uplink protocol supported by VMware that directly exchanges any network state information between the host and its upstream switches. An ESXi host is also sortof a host, but also sortof a network switch (in so far as it does forward packets locally and makes path decisions for north/south traffic); here in lies the problem, we effectively have network devices forwarding packets between each other, but Continue reading