Archive

Category Archives for "Networking"

Windows 10 ‘servicing stack’ update cripples some PCs

Some users have reported that one of this week's Windows 10 updates crippled their PCs, according to a thread on Reddit.They fingered the KB4013418 update as the most likely culprit. That update was marked simply as "Update for Windows 10 Version 1607" in Windows Update, and in the accompanying support document, tagged as a "servicing stack update."[ Related: Fix Windows 10 problems with these free Microsoft tools ] In Microsoft's parlance, a servicing stack consists of the executable file and associated libraries needed to install Windows and its updates.To read this article in full or to leave a comment, please click here

Google pulls virtual assistant ad after user outcry

Google Home users got a surprise on Thursday when their virtual assistants cheerily mentioned that the live-action remake of “Beauty and the Beast” is opening in theaters this weekend.The ad seems to pop up when users ask for a rundown of their day, which kicks off the Home’s “My Day” feature. That feature is supposed to offer users information about the weather, their calendars and relevant news. But at the end of the rundown, the Google Assistant offered the following unsolicited tidbit, according to a video posted to Twitter by Bryson Meunier :“By the way, Disney’s live action 'Beauty and The Beast' opens today,” it says. “In this version of the story, Belle is the inventor instead of Maurice. That rings truer, if you ask me. For some more movie fun, ask me something about Belle.”To read this article in full or to leave a comment, please click here

Augmented and virtual reality to see aggressive growth by 2021

Augmented and virtual reality are catching on, even if it is still early days for both.While some analysts at Strategy Analytics worry there aren't enough engaging 360-degree VR movies and other content on the market, IDC analysts on Thursday said there are plenty of early business-focused rollouts of AR to justify optimism.[ To comment on this story, visit Computerworld's Facebook page. ] IDC pointed to medical, industrial and marketing applications already in use and predicted a bullish, 10-fold spike for AR and VR headsets by 2021.To read this article in full or to leave a comment, please click here

Recruiters: Coding talent needed, degree optional

Employers who once focused on finding software development talent from top universities are now hiring developers who learned the trade from coding bootcamps, junior colleges, and online resources, technical recruiter HackerRank says.To read this article in full or to leave a comment, please click here(Insider Story)

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.This guide from Cybereason takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan.Preparation across the entire companyGood security leaders should be able to get people from across the company to help develop the IR plan. While CISOs will most likely manage the team that handles the threat, dealing with the fallout from a breach requires the efforts of the entire company.To read this article in full or to leave a comment, please click here(Insider Story)

Future of tech policy murky under Trump administration

At the outset of the Trump presidency, there is considerable uncertainty around what the new administration might mean for tech policy, a deeply complex set of issues that were largely out of view on the campaign trail.As a candidate, Trump did not articulate a tech policy agenda, though he stressed the need for a tougher posture on cybersecurity.[ Related: What to expect from the Trump administration on cybersecurity ]Now in the Oval Office, Trump has a range of areas where he could advance polices that impact the tech sector, from immigration to privacy to curbing regulations on emerging technologies such as drones and health IT applications.To read this article in full or to leave a comment, please click here

Experts divided on value of Cyber National Guard

This past weekend at SXSW, two Congressmen suggested that the U.S. create a cybersecurity reserves system, similar to the National Guard, but the idea has received a mixed welcome from the cybersecurity community.According to House Rep. Will Hurd, a Republican from Texas, a national cybersecurity reserve could help strengthen national security and bring in a diversity of experience. Hurd, who has a degree in computer science from Texas A&M, has served as an undercover CIA officer and has worked as a partner at cybersecurity firm FusionX.He has been pitching the idea of a Cyber National Guard for a while, and has suggested that the government could forgive student loan debt for those who serve. It would also help ensure a cross-pollination of experience between government and industry.To read this article in full or to leave a comment, please click here

Experts divided on value of Cyber National Guard

This past weekend at SXSW, two Congressmen suggested that the U.S. create a cybersecurity reserves system, similar to the National Guard, but the idea has received a mixed welcome from the cybersecurity community.According to House Rep. Will Hurd, a Republican from Texas, a national cybersecurity reserve could help strengthen national security and bring in a diversity of experience. Hurd, who has a degree in computer science from Texas A&M, has served as an undercover CIA officer and has worked as a partner at cybersecurity firm FusionX.He has been pitching the idea of a Cyber National Guard for a while, and has suggested that the government could forgive student loan debt for those who serve. It would also help ensure a cross-pollination of experience between government and industry.To read this article in full or to leave a comment, please click here

Microsoft ends updates for Windows 7/8.1 on new processors

As it promised, Microsoft has stopped issuing updates for Windows 7 and Windows 8.1 users whose PCs run Intel's seventh-generation processors (codename Kaby Lake), AMD's seventh-generation processors (Bristol Ridge), and Qualcomm's 8996 processor or newer. It's also likely that AMD's new Ryzen processor is included in that list. Bristol Ridge is a slightly older processor made on an older core design.Mainstream support for Windows 7 ended on January 2015, but extended support—in other words, patches—is supposed to continue until January 2020. Support for Windows 8.1 runs through next year and support ends in 2023. However, Windows 7 and Windows 8.1 PCs running these new CPUs will not scan for updates or download them from Windows Update. Windows 7 and Windows 8.1 users with new processors who run the Windows Update tool get one of two messages. The first is straightforward: To read this article in full or to leave a comment, please click here

Epoch Rollover: Coming Two Years Early To A Router Near You!

The 2038 Problem

Broken Time? -  Roeland van der Hoorn
Many computer systems and applications keep track of time by counting the seconds from "the epoch", an arbitrary date. Epoch for UNIX-based systems is the stroke of midnight in Greenwich on 1 January 1970.

Lots of application functions and system libraries keep track of the time using a 32-bit signed integer, which has a maximum value of around 2.1 billion. It's good for a bit more than 68 years worth of seconds.

Things are likely to get weird 2.1 billion seconds after the epoch on January 19th, 2038.

As the binary counter rolls over from 01111111111111111111111111111111 to 10000000000000000000000000000000, the sign bit gets flipped. The counter will have changed from its farthest reach after the epoch to its farthest reach before the epoch. time will appear to have jumped from early 2038 to late 1901.

Things might even get weird within the next year (January 2018!) as systems begin encounter freshly minted CA certificates with expirations after the epoch rollover (it's common for CA certificates to last for 20 years.) These certificates may appear to have expired in late 1901, over a century prior to their Continue reading

Yahoo breach exposes the drawbacks of state-sponsored hacking

When governments turn to private hackers to carry out state-sponsored attacks, as the FBI alleges Russia did in the 2014 breach of Yahoo, they're taking a big risk. On the one hand, it gives them a bit of plausible deniability while reaping the potential spoils of each attack, but if the hackers aren't kept on a tight leash things can turn bad. Karim Baratov, the 22-year-old Canadian hacker who the FBI alleges Russia's state security agency hired to carry out the Yahoo breach, didn't care much for a low profile. His Facebook and Instagram posts boasted of the million-dollar house he bought in a Toronto suburb and there were numerous pictures of him with expensive sports cars -- the latest an Aston Martin DB9 with the license plate "MR KARIM."To read this article in full or to leave a comment, please click here

Yahoo breach exposes the drawbacks of state-sponsored hacking

When governments turn to private hackers to carry out state-sponsored attacks, as the FBI alleges Russia did in the 2014 breach of Yahoo, they're taking a big risk. On the one hand, it gives them a bit of plausible deniability while reaping the potential spoils of each attack, but if the hackers aren't kept on a tight leash things can turn bad. Karim Baratov, the 22-year-old Canadian hacker who the FBI alleges Russia's state security agency hired to carry out the Yahoo breach, didn't care much for a low profile. His Facebook and Instagram posts boasted of the million-dollar house he bought in a Toronto suburb and there were numerous pictures of him with expensive sports cars -- the latest an Aston Martin DB9 with the license plate "MR KARIM."To read this article in full or to leave a comment, please click here

Cornell has a radio for the whole world with software filtering

Researchers at Cornell University have developed a new type of radio-on-a-chip that could mean cheaper, more flexible wireless systems. Smartphone makers could, for example, use the technology to make a single model of each phone that works anywhere in the world.Single-chip radios have become a popular choice for communications hardware in the last decade because most characteristics of the radio are determined through software, not discrete hardware components. For this reason, they are often referred to as software-defined radios.But software can only do so much. In many transceiver devices -- ones that transmit and receive -- an array of filters is needed to protect the sensitive receiver circuity from signals being transmitted. Those signals can be up to a billion times more powerful that the ones being received, so without the filters, the radio would be overwhelmed and useless.To read this article in full or to leave a comment, please click here

Layer 2 security – DHCP Details, DHCP Snooping

Layer 2 security – DHCP Details, DHCP Snooping  Introduction   This article is the first of a series explaining layer 2 attacks identification and mitigation techniques, which will be a part of a bigger series discussing Security Infrastructure.   We will be discussing the most common attacks and how to mitigate them; but more important, […]

The post Layer 2 security – DHCP Details, DHCP Snooping appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

How AR and VR can reach a billion users before 2028

We have seen it all before: This will be the year of (blank). Pick any technology—augmented reality (AR) and virtual reality (VR) headsets, wearables, social networks, etc. The hype cycle starts three to five years early, and everyone—vendors, Wall Street and venture capitalists—is disappointed when last year was not the year.It is early days for VR and even earlier for AR. Sales of VR headsets were graded disappointing after the close of the Christmas season and seemingly confirmed when BestBuy closed half of its in-store Oculus demo stations.To read this article in full or to leave a comment, please click here

Super rare functioning Apple I computer could fetch hundreds of thousands at auction

An auction house in May will look for the highest bidding fanboy or fangirl who'd like to get his or her hands on what it claims is just one of 8 functioning Apple I computers. Auction Team Breker, which is based in Germany and specializes in what it calls "technical antiques", has set an auction date for the Apple I on May 20. MORE: iPhone 8 rumor rollup The collector's item could fetch hundreds of thousands of dollars based on sales of past such items, such as an Apple I sold by Sotheby's in 2014 for about $375K and a prototype of the Apple I that sold for $815K last year. Auction Team Breker estimates its item will go for between $190K and $320K.To read this article in full or to leave a comment, please click here