Archive

Category Archives for "Networking"

Hottest iPad & Surface alternatives from Mobile World Congress 2017

While the traditional tablet market has had a tough go of it lately, some industry watchers do see growth ahead particularly in the 2-in-1 detachables sector, and the batch of new devices shown at Mobile World Congress in Barcelona this week could play a big role in any such revival.While most of the new smartphones demoed at MWC were of the Android variety, tablet makers gave Windows some love as well with possible Microsoft Surface alternatives. (Apple, as usual, didn’t display at MWC, but is said to have new iPads in the works.)To read this article in full or to leave a comment, please click here

AWS says a typo caused the massive S3 failure this week

Everyone makes mistakes. But working at Amazon Web Services means an incorrectly entered input can lead to a massive outage that cripples popular websites and services. That's apparently what happened earlier this week, when the AWS Simple Storage Service (S3) in the provider's Northern Virginia region experienced an 11-hour system failure.Other Amazon services in the US-EAST-1 region that rely on S3, like Elastic Block Store, Lambda, and the new instance launch for the Elastic Compute Cloud infrastructure-as-a-service offering were all impacted by the outage.To read this article in full or to leave a comment, please click here

Slack bug paved the way for a hack that can steal user access

One bug in Slack, the popular work chat application, was enough for a security researcher to design a hack that could trick users into handing over access to their accounts.Bug bounty hunter Frans Rosen noticed he could steal Slack access tokens to user accounts due to a flaw in the way the application communicates data in an internet browser.“Slack missed an important step when using a technology called postMessage,” Rosen said on Wednesday in an email.  PostMessage is a kind of command that can let separate browser windows communicate with each other. In Slack, it’s used whenever the chat application opens a new window to enable a voice call.To read this article in full or to leave a comment, please click here

Slack bug paved the way for a hack that can steal user access

One bug in Slack, the popular work chat application, was enough for a security researcher to design a hack that could trick users into handing over access to their accounts.Bug bounty hunter Frans Rosen noticed he could steal Slack access tokens to user accounts due to a flaw in the way the application communicates data in an internet browser.“Slack missed an important step when using a technology called postMessage,” Rosen said on Wednesday in an email.  PostMessage is a kind of command that can let separate browser windows communicate with each other. In Slack, it’s used whenever the chat application opens a new window to enable a voice call.To read this article in full or to leave a comment, please click here

Free decryption tools now available for Dharma ransomware

Computer users who have been affected by the Dharma ransomware and have held onto their encrypted files can now restore them for free. Researchers have created decryption tools for this ransomware strain after someone recently leaked the decryption keys.Dharma first appeared in November and is based on an older ransomware program known as Crysis. It's easy to recognize files affected by it because they will have the extension: .[email_address].dharma, where the email address is the one used by the attacker as a point of contact.On Wednesday, a user named gektar published a link to a Pastebin post on the BleepingComputer.com technical support forum. The post, he claimed, contained the decryption keys for all Dharma variants.To read this article in full or to leave a comment, please click here

Free decryption tools now available for Dharma ransomware

Computer users who have been affected by the Dharma ransomware and have held onto their encrypted files can now restore them for free. Researchers have created decryption tools for this ransomware strain after someone recently leaked the decryption keys.Dharma first appeared in November and is based on an older ransomware program known as Crysis. It's easy to recognize files affected by it because they will have the extension: .[email_address].dharma, where the email address is the one used by the attacker as a point of contact.On Wednesday, a user named gektar published a link to a Pastebin post on the BleepingComputer.com technical support forum. The post, he claimed, contained the decryption keys for all Dharma variants.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The contact center and CRM collision leads to a new dominant species

Some weeks ago I wrote that CRM and contact center are on a collision course. I argued that as the technologies used in CRM and the contact center will naturally mash up, the vendors of these traditionally distinct technologies will collide.In this post, I will expand upon that idea and talk about the future and a key aspect that will be important to successful synergies: how each domain leverages behaviors.CRM/contact center collision The first post argued that a co-mingling of the technologies used in CRM and the contact center worlds have occurred. This has been more of a lending of functionality. Seldom has true synergy emerged.To read this article in full or to leave a comment, please click here

52% off Logitech Bluetooth Multi-Device Keyboard – Deal Alert

Here's a Bluetooth keyboard for your computer that you can also use with your tablet and smartphone -- switch between all three effortlessly by just turning the dial. And unlike other Bluetooth keyboards, Logitech has integrated a cradle so your device stays propped up at just the right angle as you type. Works with Windows or Mac, Android or iOS, and features a key layout you'll be familiar with on any of those platforms. Logitech's multi-device keyboard currently averages 4 out of 5 stars from over 1,350 people (read reviews) on Amazon, where its typical list price of $49.99 has been recently dropped 52% to just $23.99.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Full text of Amazon’s post-mortem from its S3 cloud brownout

As is customary after a major service disruption, Amazon Web Services today released a post-mortem explaining why its Simple Storage Service experienced elevated error rates, causing many sites across the Internet to slow down or stop working on Tuesday.+MORE AT NETWORK WORLD: 5 Lessons from the AWS S3 outage and how to insulate yourself from the next one | Half of the top 100 retail websites had slow load times during the S3 outage, vendor finds +To read this article in full or to leave a comment, please click here

Cisco expands Docker partnership, rolls Contiv open source container networking software

Cisco and Docker today announced an expanded partnership that will see further integration of container management software from Docker with infrastructure equipment.Cisco also released a 1.0 version of an open source container networking project named Contiv.+More on Network World: 5 Lessons from Amazon’s S3 Cloud blunder – and how to protect yourself from the next one +The integration of Cisco hardware with Docker software is codified through new Cisco Validated Designs (CVD). One CVD includes a Cisco UCS deployment pre-integrated to support Docker Datacenter, a container management platform that includes the Docker runtime Engine, a Trusted Registry and a Universal Control Plane. Cisco announced another CVD that includes its FlexPod hyperconverged infrastructure with NetApp storage and support for Docker software.To read this article in full or to leave a comment, please click here

Understanding Windows 10’s Unified Update Platform

The Unified Update Platform (UUP) was introduced to the Windows 10 Insider Preview with Build 14986 on December 11, 2016. It changes how Windows Update works in a profound and interesting way. This is explained in some detail in a Windows Insider blog post entitled "Introducing Unified Update Platform (UUP)" that posted on November 3, 2016, so I'll just hit some high points here. The original post is well worth a read, if you're into the nitty-gritty details.To read this article in full or to leave a comment, please click here(Insider Story)

How to format an SD card in Linux

As I was working on a tutorial about installing Raspbian on Raspberry Pi 3, I realized that I had to format the Micro SD card with fat32 partition. Another tutorial was in order!Since different desktop environments use different tools to perform the same task, I resorted to one method that can be consistent across desktop environments: command line.So here is how you format an SD card, USB drive or Micro SD card with fat32 file system from the command line in Linux.RELATED: 11 pointless but awesome Linux terminal tricks 1. Plug in your removable flash drive and run the ‘lsblk’ command to identify the device.To read this article in full or to leave a comment, please click here

‘Paging Dr. VT320, paging Dr. VT320’

 Writes a contributor to Reddit’s section devoted to all things “mildly interesting:”“This is the computer (pictured above) which controls the paging system at the hospital where I work.”The audience found this much more than mildly interesting, as the post attracted more than 500 comments and 13,000 up-votes.The comments were split between those who see a disaster in the making:“You may find it funny, but aging hardware and obsolete systems plague medical facilities, and when those critical old pieces fail, it costs the facility many times more capital and labor power to restore critical systems, and risks patient health and safety.”To read this article in full or to leave a comment, please click here

‘Paging Dr. VT320, paging Dr. VT320’

 Writes a contributor to Reddit’s section devoted to all things “mildly interesting:”“This is the computer (pictured above) which controls the paging system at the hospital where I work.”The audience found this much more than mildly interesting, as the post attracted more than 500 comments and 13,000 up-votes.The comments were split between those who see a disaster in the making:“You may find it funny, but aging hardware and obsolete systems plague medical facilities, and when those critical old pieces fail, it costs the facility many times more capital and labor power to restore critical systems, and risks patient health and safety.”To read this article in full or to leave a comment, please click here