Archive

Category Archives for "Networking"

Anonymous hacker causes dark web to shrink by as much as 85%

An attack by Anonymous, the shadowy hacker crew that seems to alternate between good guys and bad guys depending on the issue, help cut the dark web down by as much as 85 percent, according to a new report. Anonymous turned its sights on Freedom Hosting II, a hosting service for Tor-based sites, at the start of February. Freedom Hosting II (FHII) was the host to over 10,000 dark web sites, many of them hosting images of sexually abused children. It was named after another host, Freedom Hosting, that Anonymous took down in 2011. An Anonymous hacker went after the service after they discovered the provider knew what was going on and did nothing to stop it. The hacker who did it told Vice it was his first hack, and he didn't intend to take down the site—just look through it. When he found large amounts of child porn, he deduced the site knew what was going on and he decided to take down the hosts. To read this article in full or to leave a comment, please click here

Anonymous hacker causes dark web to shrink by as much as 85%

An attack by Anonymous, the shadowy hacker crew that seems to alternate between good guys and bad guys depending on the issue, help cut the dark web down by as much as 85 percent, according to a new report. Anonymous turned its sights on Freedom Hosting II, a hosting service for Tor-based sites, at the start of February. Freedom Hosting II (FHII) was the host to over 10,000 dark web sites, many of them hosting images of sexually abused children. It was named after another host, Freedom Hosting, that Anonymous took down in 2011. An Anonymous hacker went after the service after they discovered the provider knew what was going on and did nothing to stop it. The hacker who did it told Vice it was his first hack, and he didn't intend to take down the site—just look through it. When he found large amounts of child porn, he deduced the site knew what was going on and he decided to take down the hosts. To read this article in full or to leave a comment, please click here

IBM pledge: Not only does Notes/Domino live, there’s no end in sight

Having begun my time here covering the late 1990s email/collaboration battles between Lotus Notes/Domino, Microsoft Outlook/Exchange, and, yes, Novell GroupWise, it’s interesting to see IBM, which bought Lotus in 1995, pledging to support Domino and Notes for, well, an open-ended long period of time.Not surprising, though.    In a blog post published yesterday, Ed Brill, vice president of product management and design for IBM Collaboration Solutions, laid out the company’s current thinking: “Notes/Domino 9.0 shipped in 2013, and IBM’s normal five-year support model meant that mainstream support could have ended in 2018. However, we know how important these products are to your business, and we are continuing to invest in new functionality. For IBM Notes/Domino 9.0, we have announced that product support will be extended through at least 2021, and extended support through at least 2024. There is no end of life planned for Notes and Domino, and we will continue to update the timeline for support as appropriate based on future releases and market requirements.”To read this article in full or to leave a comment, please click here

IBM pledge: Not only does Notes/Domino live, there’s no end in sight

Having begun my time here covering the late 1990s email/collaboration battles between Lotus Notes/Domino, Microsoft Outlook/Exchange, and, yes, Novell GroupWise, it’s interesting to see IBM, which bought Lotus in 1995, pledging to support Domino and Notes for, well, an open-ended long period of time.Not surprising, though.    In a blog post published yesterday, Ed Brill, vice president of product management and design for IBM Collaboration Solutions, laid out the company’s current thinking: “Notes/Domino 9.0 shipped in 2013, and IBM’s normal five-year support model meant that mainstream support could have ended in 2018. However, we know how important these products are to your business, and we are continuing to invest in new functionality. For IBM Notes/Domino 9.0, we have announced that product support will be extended through at least 2021, and extended support through at least 2024. There is no end of life planned for Notes and Domino, and we will continue to update the timeline for support as appropriate based on future releases and market requirements.”To read this article in full or to leave a comment, please click here

Google offers new ‘Always Free’ cloud tier to attract users

Google is letting its customers get a taste of its cloud for free, without a time-limited trial. The company quietly launched a new “Always Free” tier on Thursday that lets people use small amounts of its public cloud services without charge, beyond the company’s limited-time trial.The tier includes — among other things — 1 f1-micro compute instance, 5 GB per month of Regional Storage and 60 minutes per month of access to the Cloud Speech API. Using the free tier requires users to provide a credit card that Google can automatically bill for any use over the limits.In addition, the cloud provider expanded its free trial so that users get $300 in credits that they can use for up to 12 months. Google will halt users’ workloads if they eat up all of the credits before the end of 12 months.To read this article in full or to leave a comment, please click here

IBM’s position on Security Analytics and Operations (SOAPA)

Just what is a security operations and analytics platform architecture (SOAPA) anyway? In the past, most enterprises anchored their security analytics and operations with one common tool: Security Information and Event Management (SIEM) systems. Now, SIEM still plays a major role here, but many organizations are supplementing their security operations centers (SOCs) with additional data, analytics tools and operations management systems. We now see SOCs as a nexus for things like endpoint detection and response tools (EDR), network analytics, threat intelligence platforms (TIPs) and incident response platforms (IRPs). In aggregate, security operations is changing, driven by a wave of new types of sensors, diverse data sources, analytics tools and operational requirements. And these changes are driving an evolution from monolithic security technologies to a more comprehensive event-driven software architecture along the lines of SOA 2.0, where disparate security technologies connected with middleware for things like data exchange, message queueing and business-level trigger conditions. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Well-funded doesn’t mean well-secured

Three of my four children are of school-going age. When they arrive home in the afternoon, the youngest usually makes a dash for the games console, the middle one is tired to the point of being miserable, and the eldest announces herself loudly, wanting to share every detail from her day with anyone who will lend an ear. The only thing they all seem to have in common is that they are hungry and want dinner.RELATED: What IT admins love/hate about 8 top network monitoring tools While I'm the type of parent who makes the children fish-finger sandwiches and declares them fed, my wife prefers to serve a lavish five-course meal. In the past, she would often customize meals to meet each child's individual taste and preference. After a while, I had to put a stop to it.To read this article in full or to leave a comment, please click here

IBM’s position on Security Analytics and Operations (SOAPA)

Just what is a security operations and analytics platform architecture (SOAPA) anyway? In the past, most enterprises anchored their security analytics and operations with one common tool: Security Information and Event Management (SIEM) systems. Now, SIEM still plays a major role here, but many organizations are supplementing their security operations centers (SOCs) with additional data, analytics tools and operations management systems. We now see SOCs as a nexus for things like endpoint detection and response tools (EDR), network analytics, threat intelligence platforms (TIPs) and incident response platforms (IRPs). In aggregate, security operations is changing, driven by a wave of new types of sensors, diverse data sources, analytics tools and operational requirements. And these changes are driving an evolution from monolithic security technologies to a more comprehensive event-driven software architecture along the lines of SOA 2.0, where disparate security technologies connected with middleware for things like data exchange, message queueing and business-level trigger conditions. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Well-funded doesn’t mean well-secured

Three of my four children are of school-going age. When they arrive home in the afternoon, the youngest usually makes a dash for the games console, the middle one is tired to the point of being miserable, and the eldest announces herself loudly, wanting to share every detail from her day with anyone who will lend an ear. The only thing they all seem to have in common is that they are hungry and want dinner.RELATED: What IT admins love/hate about 8 top network monitoring tools While I'm the type of parent who makes the children fish-finger sandwiches and declares them fed, my wife prefers to serve a lavish five-course meal. In the past, she would often customize meals to meet each child's individual taste and preference. After a while, I had to put a stop to it.To read this article in full or to leave a comment, please click here

Microsoft killing vowel-challenged So.cl social networking service on March 15

Microsoft's FUSE Labs has announced it is killing So.cl (or just plain Socl), a multimedia-infused social network and search tool positioned as a complement to Facebook, Twitter, Pinterest, Tumblr and other more established social services. The So.cl (pronounced Social) service quietly launched at a few universities in late 2011, became generally available in 2012 and is being discontinued as of March 15.VISIT the 2016 Microsoft Product GraveyardThe free service could be accessed via a Microsoft or Facebook account. (Confession: I created my first So.cl post this morning.)To read this article in full or to leave a comment, please click here

IDG Contributor Network: Proving how bad enterprise software really is, Knoa delivers visibility

I have written at length about just how bad many legacy enterprise software products are. I was reminded about this recently when raising an invoice for one particular client. This client is an enterprise technology vendor, with some of the best software tools on the planet and extensive conceptual videos detailing just how its platforms enable enterprise application users to be as efficient as they are with their consumer technology tools.Alas, the reality of the internal tools that this particular vendor uses was very different from the hype. The task of raising a single invoice—a seemingly simple job—took on absolutely epic proportions with deep operating system and browser requirements, poor user experience, and, fundamentally, a system that didn't work. I came away, once again feeling nothing but sympathy for my friends who have to use these systems on a day-to-day basis.To read this article in full or to leave a comment, please click here

IMF moving IT jobs to offshore firm

The International Monetary Fund in Washington is shifting some of its IT work overseas, and somewhere between 100 and 200 IT workers are impacted by this change.The work is being taken over by India-based IT managed services provider L&T Infotech, and the change was announced to the staff last year. The transition, which involves training L&T employees, is continuing through the end of this year. IMF IT workers are being to encourage to stay by means of an incentive package.The affected IT workers are all third-party contractors. Some of the contractors have been working at the IMF for five and 10 years or longer, and are viewed as staff for most purposes.To read this article in full or to leave a comment, please click here

5G plans just hit the accelerator

The international body crafting the 5G standard has approved an accelerated roadmap that could see large-scale trials and deployments in 2019 instead of 2020.At a meeting this week in Dubrovnik, Croatia, the 3GPP signed off on a 5G work plan that several top mobile operators and network vendors came out in favor of last week. It would create an interim 5G specification before the full-scale standard is completed.It’s important to get the next generation of mobile out into the world soon because users keep increasing their data consumption, said Lorenzo Casaccia, vice president of technical standards at Qualcomm, in a blog post on Thursday. That’s why his company is backing the in-between spec, which is now expected to be done by the end of this year and available in software about three months later.To read this article in full or to leave a comment, please click here