Archive

Category Archives for "Networking"

PII of 33,698,126 Americans leaked online

The personal identifying information (PII)—names, email addresses, phone numbers, physical addresses, employers and job titles—for 33,698,126 Americans has been leaked online.The data, a 52.2GB CSV file, came from a commercial corporate database. Security researcher Troy Hunt determined that the breach came from NetProspex, a service provided by Dun & Bradstreet, which ironically was named as a 2017 world’s most ethical company.To read this article in full or to leave a comment, please click here

Amazon Discounts its Fire Tablet Bundle an Additional $27.98 With This Code – Deal Alert

Through this Saturday, sink the 16GB Fire Tablet bundle's already discounted price to just $59.99 using the code FIREBUNDLE at checkout -- a significant deal considering its typical $107.97 value. The bundle includes the latest 16GB Fire 7" Tablet with special offers ($69.99), Amazon cover ($24.99), and Nupro screen protector ($12.99). Amazon's newest Fire tablet features a rich 7" IPS display and a 1.3 GHz quad-core processor. Integrated Alexa service lets you ask away with a button press. Enjoy millions of movies, TV shows, songs, Kindle e-books, apps and games, and enjoy them uninterrupted with Fire's long lasting 7-hour battery. See this deal on Amazon before it expires by adding to cart and applying FIREBUNDLE at checkout. To read this article in full or to leave a comment, please click here

SAP adds new features to Vora and readies a cloud version

SAP has added some new capabilities to SAP Vora, its in-memory distributed computing system based on Apache Spark and Hadoop. Version 1.3 of Vora includes a number of new distributed, in-memory data-processing engines, including ones for time-series data, graph data and schema-less JSON data, that accelerate complex processing. Common uses for the graph engine might be analyzing social graphs or supply chain graphs, said Ken Tsai, SAP's head of product marketing for database and data management. One application that would benefit from the new time-series engine is looking for patterns of electricity consumption in smart metering data.To read this article in full or to leave a comment, please click here

Linux Systemd & Golang Services using Kardianos Service

This week I have done something new, but I found myself dealing with a ‘zero knowledge’ situation or something I like to call ZKS. This is one of those ones where it’s fun, but it also feels a bit stressy as there was enough rope to hang myself with.

That something new is Systemd, which is a Linux operating system thing that manages the initialisation of user things. To speak about this more technically, it is a drop in replacement ‘init’ system that starts services and sets up the user environment. Wikipedia has this to say about it:

Systemd is an init system used in Linux distributions to bootstrap the user space and manage all processes

For those lacking historic knowledge around systemd, it previously many upset devs and administrators, which in turn setup a site called ‘boycottsystemd’ which looks to be offline. They said it flies in the face of doing it the Unix way, which is (to summarise) do one thing and do it well. Systemd is now the default init system for Ubuntu 15x and newer releases. Can’t be that bad…right?

Whilst this is not a complete education around systemd, it’s popular and is reasonably easy to Continue reading

IDG Contributor Network: 4 ways to contain IT storage creep

In most businesses, data grows rapidly, voraciously consuming storage as it does so and ratcheting up expenses. Sometimes it seems impossible to keep it under control.However, there is a difference between the Blob and storage that puts you in the driver’s seat. Data didn’t arrive on earth courtesy of a meteorite. We create it by ourselves every day. If we produced the problem, we should be able to defend against it and its associated costs. Here are some ways you can improve storage efficiency.1.  Tier your data Wouldn’t it be nice if business unit leaders would come to you and say, “I need a sub-millisecond response time on my reads and writes for this application,” plus inform you of all their other requirements? That would make it easy to determine the IT resources you should assign to an application. The truth, however, is that in many cases, business leaders don’t know what they need. They just want to make sure that the application does not slow down operations in their department.To read this article in full or to leave a comment, please click here

Desktop Linux the best it’s ever been—and keeps getting better

I can be a pretty pessimistic guy. I’m fairly convinced that the Internet of Things spells certain doom for mankind, and I’ve made a habit of standing in front of large rooms full of people simply to tell them how much I think “Linux sucks.” If you were to call me a Negative Nancy, you wouldn’t be far off.To make matters worse, I’m about to publish three new articles—each of them extremely pessimistic and gloomy—over the next week.  otal “sky is falling, we’re all gonna die” sort of stuff.To read this article in full or to leave a comment, please click here

Introducing Zero Round Trip Time Resumption (0-RTT)

Introducing Zero Round Trip Time Resumption (0-RTT)

Cloudflare’s mission is to help build a faster and more secure Internet. Over the last several years, the Internet Engineering Task Force (IETF) has been working on a new version of TLS, the protocol that powers the secure web. Last September, Cloudflare was the first service provider to enable people to use this new version of the protocol, TLS 1.3, improving security and performance for millions of customers.

Today we are introducing another performance-enhancing feature: zero round trip time resumption, abbreviated as 0-RTT. About 60% of the connections we see are from people who are visiting a site for the first time or revisiting after an extended period of time. TLS 1.3 speeds up these connections significantly. The remaining 40% of connections are from visitors who have recently visited a site and are resuming a previous connection. For these resumed connections, standard TLS 1.3 is safer but no faster than any previous version of TLS. 0-RTT changes this. It dramatically speeds up resumed connections, leading to a faster and smoother web experience for web sites that you visit regularly. This speed boost is especially noticeable on mobile networks.

We’re happy to announce that 0-RTT is Continue reading

Malicious uploads allowed hijacking of WhatsApp and Telegram accounts

A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos.The vulnerability was discovered last week by researchers from Check Point Software Technologies and was patched by the WhatsApp and Telegram developers after the company privately shared the flaw's details with them.The web-based versions of WhatsApp and Telegram synchronize automatically with the apps installed on users' phones. At least in the case of WhatsApp, once paired using a QR code, the phone needs to have an active internet connection for WhatsApp messages to be relayed to the browser on the computer.To read this article in full or to leave a comment, please click here

Malicious uploads allowed hijacking of WhatsApp and Telegram accounts

A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos.The vulnerability was discovered last week by researchers from Check Point Software Technologies and was patched by the WhatsApp and Telegram developers after the company privately shared the flaw's details with them.The web-based versions of WhatsApp and Telegram synchronize automatically with the apps installed on users' phones. At least in the case of WhatsApp, once paired using a QR code, the phone needs to have an active internet connection for WhatsApp messages to be relayed to the browser on the computer.To read this article in full or to leave a comment, please click here

Understanding the Federal Government’s Rapid Adoption of Cloud

One of the biggest trends in the IT industry at the moment is enterprise adoption of the public cloud. It’s obvious that it’s been accelerating over the recent years, but perhaps more importantly, Federal agencies are beginning to take a serious look at the cloud in an effort to reform IT and to achieve greater agility …

Microsoft Teams takes on Slack with enterprise bots, Office 365 tie-ins

Microsoft Teams is now live – and on by default – for Office 365 subscribers with Business Essentials, Business Premium and Enterprise plans.Teams is Microsoft’s answer to Slack, with an emphasis on Office 365 integration. Teams is automatically tied to tools such as Outlook, SharePoint, OneNote and Skype for Business. With Skype tie-ins, for example, Teams users can move from text-based chatting to a voice or video call, directly within the Teams app. RELATED: 4 reasons Microsoft Teams will kill Slack… and 4 reasons it won’tTo read this article in full or to leave a comment, please click here

Acronym: M is for Malware

A malware researcher known as Antelox recently tweeted about an unknown malware sample that caught our eye. Upon further investigation, it is a modular malware known as Acronym and could possibly be associated with the Win32/Potao malware family and the Operation Potao Express campaign. This […]

Twitter accounts hacked, Twitter Counter steps forward as culprit

Twitter Counter, a third-party analytics service, appears once again to have provided a gateway for hackers to post messages to high-profile Twitter accounts.An unlikely number of Twitter users suddenly learned to speak Turkish on Wednesday, posting an inflammatory message in the language replete with Nazi swastikas.Among those posting the message were the Twitter accounts of Forbes magazine, the Atlanta Police Department, and Amnesty International, one of the few hacked accounts one might expect to speak Turkish.Fears that these accounts had all been hacked were quickly allayed, when Twitter identified a third-party app as being to blame.To read this article in full or to leave a comment, please click here

Twitter accounts hacked, Twitter Counter steps forward as culprit

Twitter Counter, a third-party analytics service, appears once again to have provided a gateway for hackers to post messages to high-profile Twitter accounts.An unlikely number of Twitter users suddenly learned to speak Turkish on Wednesday, posting an inflammatory message in the language replete with Nazi swastikas.Among those posting the message were the Twitter accounts of Forbes magazine, the Atlanta Police Department, and Amnesty International, one of the few hacked accounts one might expect to speak Turkish.Fears that these accounts had all been hacked were quickly allayed, when Twitter identified a third-party app as being to blame.To read this article in full or to leave a comment, please click here

Review: MongoDB learns cool new tricks

MongoDB 3.4 continues the trend of databases building out support for a range of conceptual data models over the same underlying data store. This multimodel approach aims to deliver a single database that can be used to store data as documents, tables, and graphs simultaneously. The benefit to the user is a dramatically simplified infrastructure when compared to a polyglot persistence model, which might entail managing three or four separate data stores to satisfy those different use cases.To read this article in full or to leave a comment, please click here(Insider Story)

Spy agency, DOE, see China nearing supercomputing leadership

Advanced computing experts at the National Security Agency and the Department of Energy are warning that China is "extremely likely" to take leadership in supercomputing as early as 2020, unless the U.S. acts quickly to increase spending.China's supercomputing advances are not only putting national security at risk, but also U.S. leadership in high-tech manufacturing. If China succeeds, it may "undermine profitable parts of the U.S. economy," according to a report titled U.S. Leadership in High Performance Computing by HPC technical experts at the NSA, the DOE, the National Science Foundation and other agencies.To read this article in full or to leave a comment, please click here

Spy agency, DOE, see China nearing supercomputing leadership

Advanced computing experts at the National Security Agency and the Department of Energy are warning that China is "extremely likely" to take leadership in supercomputing as early as 2020, unless the U.S. acts quickly to increase spending.China's supercomputing advances are not only putting national security at risk, but also U.S. leadership in high-tech manufacturing. If China succeeds, it may "undermine profitable parts of the U.S. economy," according to a report titled U.S. Leadership in High Performance Computing by HPC technical experts at the NSA, the DOE, the National Science Foundation and other agencies.To read this article in full or to leave a comment, please click here