Archive

Category Archives for "Networking"

What enterprises can learn in the aftermath of a phishing attack

The problem: spearphishingImage by John Singleton Copley/National Gallery of ArtSpearphishing is a top attack vector used by cyber adversaries today. Consists of fraudulent emails that appear to be legitimate which target specific organizations, groups, or individuals to gain access to information systems. Targeted spear phishing also leverages social engineering which includes research about specific targets of interest. Organizations rely on email connectivity with the outside to function and thus is an entry into a potential target’s environment that bypasses many of the legacy security stack.To read this article in full or to leave a comment, please click here

Antsy Windows 10 users can grab Creators Update now

Microsoft on Wednesday began letting antsy customers download Creators Update, the latest Windows 10 feature upgrade.Last week, the company had said it would make Creators Update available for manual download on April 5, about a week before it will pull the Windows Update trigger and start pushing the upgrade to most users.[ See Computerworld’s Review of Windows 10 Creators Update. ]To read this article in full or to leave a comment, please click here

Network Automation Is Much More than Configuration Management

Most network automation presentations you can find on the Internet focus on configuration management, either to provision new boxes, or to provision new services, so it’s easy to assume that network automation is really a fancy new term for consistent device configuration management.

However, as I explained in the Network Automation 101 webinar, there’s so much more you can do and today I’d like to share a real-life example from Jaakko Rautanen, an alumni of my Building Network Automation Solutions online course.

Read more ...

ARIN 39 Report

Having just spent two and a half days at an ARIN Public Policy Meeting, I’d like to share some of my impressions of the meeting, and the state of address policy in the region served by ARIN.

Encryption is critical for business communication

Imagine if all your business contracts were sent to customers written on postcards. Everyone who happened to see the postcard could see exactly what you were going to charge the customer, how many of your product the customer is going to order - and all of the information about the customer.

Your competition, naturally, could take that information and send a contract to that customer of yours that undercuts your proposal and offers better terms. They could also share that information with others to let them know that this customer buys from you. (Or, at least, they used to!) Your customer, too, could potentially see what you are charging other customers.

Now... STOP imagining - THIS IS HOW THE INTERNET WORKS TODAY!

Dan York

US says laptop ban may expand to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops and other electronics into the cabin for certain flights from the Middle East.“We may take measures in the not too distant future to expand the number of airports,” said Homeland Security secretary John Kelly on Wednesday during a congressional hearing.Last month, the U.S. announced the ban, which affects ten airports, all of which are in Muslim-majority countries. Passengers flying to the U.S. are barred from bringing any electronic devices larger than a smartphone into a plane’s cabin, and must instead check them in as baggage.    To read this article in full or to leave a comment, please click here

US says laptop ban may expand to more airports

The U.S. might add other airports to its ban restricting passengers from bringing laptops and other electronics into the cabin for certain flights from the Middle East.“We may take measures in the not too distant future to expand the number of airports,” said Homeland Security secretary John Kelly on Wednesday during a congressional hearing.Last month, the U.S. announced the ban, which affects ten airports, all of which are in Muslim-majority countries. Passengers flying to the U.S. are barred from bringing any electronic devices larger than a smartphone into a plane’s cabin, and must instead check them in as baggage.    To read this article in full or to leave a comment, please click here

Your Cheese Moved a Long Time Ago

I was recently on a panel at the Event-Driven Automation Meetup at LinkedIn in Sunnyvale, CA, and we all had a really good hour-long conversation about automation. What really made me happy was that nearly the entire conversation focused on bringing the same principles that companies like LinkedIn and Facebook use on their network to smaller organizations, making them practical for more widespread use. Nina Mushiana of @LinkedIn says "Anything that can be documented should be automated".

Decoding FSK

Something I’ve been playing with lately is software defined radio with GNURadio. I’m not good at it yet, but I’ve managed to decode the signals from a couple of things.

This is my step-by-step for how I decoded data from a boiler thermostat. I’m not saying it’s the best way, or even a good way. But it’s what got me there.

0. Find the frequency

Often this is written on the device itself. Other times it’s in the manual. If not, then more research is needed, such as by trying to find the manufacturer on fcc.gov or similar.

In this case it was easy. The manual said “868 MHz”, which is in the SRD860 band.

1. Capture some data

When I poked at the controls of the thermostat, saying “please make the room 25 degrees”, the thermostat must send this data to the boiler. I could hear the boiler start up and shut down, so there must be something sent between me pressing the buttons and I heard the results.

I started by centering around 868.5 Mhz with 1Msps. The minimum for the RTL-SDR is 900ksps, so even if you wanted to see less than 1MHz you need Continue reading

Your Cheese Moved a Long Time Ago

I was recently on a panel at the Event-Driven Automation Meetup at LinkedIn in Sunnyvale, CA, and we all had a really good hour-long conversation about automation. What really made me happy was that nearly the entire conversation focused on bringing the same principles that companies like LinkedIn and Facebook use on their network to smaller organizations, making them practical for more widespread use.

One particular topic that came up was one I’ve struggled with for the past few years; What about Day 2 of network automation? So, we manage to write some Ansible playbooks to push configuration files to switches - what’s next? Often this question isn’t asked. I think the network automation conversation has progressed to the point where we should all start asking this question more often.

I believe that the network engineering discipline is at a crossroads, and the workforce as a whole needs to make some changes and decisions in order to stay relevant. Those changes are all based on the following premise:

The value of the network does not Continue reading

Your Cheese Moved a Long Time Ago

I was recently on a panel at the Event-Driven Automation Meetup at LinkedIn in Sunnyvale, CA, and we all had a really good hour-long conversation about automation. What really made me happy was that nearly the entire conversation focused on bringing the same principles that companies like LinkedIn and Facebook use on their network to smaller organizations, making them practical for more widespread use.

One particular topic that came up was one I’ve struggled with for the past few years; What about Day 2 of network automation? So, we manage to write some Ansible playbooks to push configuration files to switches - what’s next? Often this question isn’t asked. I think the network automation conversation has progressed to the point where we should all start asking this question more often.

I believe that the network engineering discipline is at a crossroads, and the workforce as a whole needs to make some changes and decisions in order to stay relevant. Those changes are all based on the following premise:

The value of the network does not Continue reading

Your Cheese Moved a Long Time Ago

I was recently on a panel at the Event-Driven Automation Meetup at LinkedIn in Sunnyvale, CA, and we all had a really good hour-long conversation about automation. What really made me happy was that nearly the entire conversation focused on bringing the same principles that companies like LinkedIn and Facebook use on their network to smaller organizations, making them practical for more widespread use. Nina Mushiana of @LinkedIn says "Anything that can be documented should be automated".

Google is helping to build another Asia-Pacific submarine cable

Google is investing in another massive undersea fiber-optic cable as a part of its plans to build out network connectivity around the world. The company announced Wednesday that it is helping to fund a project called Indigo, which will connect Jakarta, Singapore, Perth and Sydney to one another.The cable will run for approximately 9,000 kilometers (almost 5,600 miles) and provide a capacity of roughly 18Tbps (bits per second). It's being built to bring users more connectivity in a region that has growing internet needs.Google has now invested in five submarine cables in the Asia-Pacific region and seven overall. By investing in these cables, the company hopes to better compete with other cloud providers and consumer internet companies.To read this article in full or to leave a comment, please click here

Google is helping to build another Asia-Pacific submarine cable

Google is investing in another massive undersea fiber-optic cable as a part of its plans to build out network connectivity around the world. The company announced Wednesday that it is helping to fund a project called Indigo, which will connect Jakarta, Singapore, Perth and Sydney to one another.The cable will run for approximately 9,000 kilometers (almost 5,600 miles) and provide a capacity of roughly 18Tbps (bits per second). It's being built to bring users more connectivity in a region that has growing internet needs.Google has now invested in five submarine cables in the Asia-Pacific region and seven overall. By investing in these cables, the company hopes to better compete with other cloud providers and consumer internet companies.To read this article in full or to leave a comment, please click here

iPhone 8 release date may be pushed back to October or November

We may have some bad news for anyone out there eagerly counting down the days until Apple releases its highly anticipated iPhone 8. According to a fresh report from the Chinese-language Economic Daily News (via Digitimes), the iPhone 8 release date may be pushed back by one or two months due to technical challenges Apple is encountering in the manufacturing process.According to the report, Apple is having some technical problems with the lamination process involved with the iPhone 8's OLED panels. Additionally, the company is seeing some issues with incorporating the device's advanced 3D camera sensors.To read this article in full or to leave a comment, please click here

Most notable tech leaders delivering 2017 college commencement addresses

You’d think ponying up for a technology leader to be your school’s commencement day speaker would be so much less of a hassle than going with a high profile politician such as President Donald Trump or his rival Hillary Clinton, yet 2017 appears to be a lean year for top techies on the college/university commencement circuit.This seems especially true for tech leaders in enterprise networking and IT, whereas in the past the heads of companies such as Cisco, IBM and Salesforce.com have commanded the commencement day stage at top schools.To read this article in full or to leave a comment, please click here

Cisco issues variety of security warnings on wireless gear

Cisco warned of a variety of vulnerabilities – from letting attackers issue DDOS attack to making devices unexpectedly reload -- in some of its wireless access point and LAN gear.The only critical alert came for vulnerability in Cisco Wave 2 Aironet 1830 Series and Cisco Aironet 1850 Series Access Points.In those devices, running Cisco Mobility Express Software, a vulnerability could let an unauthenticated, remote attacker take complete control of an affected device, the company stated.+More on Network World: Cisco expands wireless reach with access points, management software+To read this article in full or to leave a comment, please click here

Cisco issues variety of security warnings on wireless gear

Cisco warned of a variety of vulnerabilities – from letting attackers issue DDOS attack to making devices unexpectedly reload -- in some of its wireless access point and LAN gear.The only critical alert came for vulnerability in Cisco Wave 2 Aironet 1830 Series and Cisco Aironet 1850 Series Access Points.In those devices, running Cisco Mobility Express Software, a vulnerability could let an unauthenticated, remote attacker take complete control of an affected device, the company stated.+More on Network World: Cisco expands wireless reach with access points, management software+To read this article in full or to leave a comment, please click here

More high-end GPUs are now compatible with Dell’s 8K monitor

Getting 8K displays to work with Windows 10 PCs can be difficult, as Dell is finding out.But playing with 8K on PCs is a discovery process for Dell, which shipped the first-ever 8K display -- the Dell 32 UltraSharp 8K Monitor -- last week. The small initial stock of the US$5,000 display sold out in a few days.The display won't work on all PCs and needs specific hardware and display ports. But Dell is finding out that more hardware than it originally thought can handle 8K graphics, including AMD's Radeon Pro WX 7100 workstation GPU.To read this article in full or to leave a comment, please click here