Archive

Category Archives for "Networking"

F-bombing cop recorded threatening to sic dog on driver to rip him up

Getting pulled over by the cops can be stressful, especially if one of the cops is shouting, cursing and threatening to sic a 90-pound dog on a motorist to rip the *bleep* out of him. The Atlantic City cop was dropping f-bombs all over the place, doing so at least 10 times in a one-minute, 20-second video clip of the traffic stop incident which was posted on Facebook.I don’t see how you could help but be offended by the video. If not by the cop’s spewing of foul-language, then by the threats the officer made. It is unclear why the cops pulled over the young men, but one of the cops nuked out upon discovering the driver was using his phone to film them. One of the unidentified cops said, “Listen there’s two ways that this can go. Take that phone and stick it out of my face. I’m not gonna tell you again.”To read this article in full or to leave a comment, please click here

F-bombing cop recorded threatening to sic dog on driver to rip him up

Getting pulled over by the cops can be stressful, especially if one of the cops is shouting, cursing and threatening to sic a 90-pound dog on a motorist to rip the *bleep* out of him. The Atlantic City cop was dropping f-bombs all over the place, doing so at least 10 times in a one-minute, 20-second video clip of the traffic stop incident which was posted on Facebook.I don’t see how you could help but be offended by the video. If not by the cop’s spewing of foul-language, then by the threats the officer made. It is unclear why the cops pulled over the young men, but one of the cops nuked out upon discovering the driver was using his phone to film them. One of the unidentified cops said, “Listen there’s two ways that this can go. Take that phone and stick it out of my face. I’m not gonna tell you again.”To read this article in full or to leave a comment, please click here

Watch Air Gordon dunk with an assist from Intel drone

Give Orlando Magic forward Aaron Gordon and Intel credit for creativity: The NBA player employed an AscTec Neo drone as part of his NBA Slam Dunk Contest repertoire. Intel Orlando Magic forward Aaron Gordon practices with Intel’s AscTec Neo drone ahead of the Slam Dunk Contest, as part of NBA All-Star 2017 festivities. Unfortunately, it took the athletic player 4 attempts to grab a pass from the roughly 11-pound hexicopter and complete the dunk, and he wound up getting knocked out of the competition early.To read this article in full or to leave a comment, please click here

Python – Kirk Byers Course Week 3 Part 2

This post will describe the exercises and solutions for week three of Kirk Byers Python for Network Engineers.

Exercise two of week three we already completed in a previous post where we used a For loop to loop through the BGP output.

Let’s move on to exercise three instead:

III. You have the following 'show ip int brief' output.
show_ip_int_brief = '''
Interface            IP-Address      OK?     Method      Status     Protocol
FastEthernet0   unassigned      YES     unset          up          up
FastEthernet1   unassigned      YES     unset          up          up
FastEthernet2   unassigned      YES     unset          down      down
FastEthernet3   unassigned      YES     unset          up          up
FastEthernet4    6.9.4.10          YES     NVRAM       up          up
NVI0                  6.9.4.10          YES     unset           up          up
Tunnel1            16.25.253.2     YES     NVRAM       up          down
Tunnel2            16.25.253.6     YES     NVRAM       up          down
Vlan1                unassigned      YES    NVRAM       down      down
Vlan10              10.220.88.1     YES     NVRAM       up          up
Vlan20              192.168.0.1     YES     NVRAM       down      down
Vlan100            10.220.84.1     YES     NVRAM       up          up
'''
From this output, create a list where each element in the list is a tuple consisting of (interface_name, ip_address, status, protocol).  Only include interfaces that are in the up/up state.
Print this list to standard output.

In this Continue reading

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Python – Kirk Byers Course Week 3 Part 1

This post will describe the exercises and solutions for week three of Kirk Byers Python for Network Engineers.

The first exercise of the week is the following:

I. Create an IP address converter (dotted decimal to binary).  This will be similar to what we did in class2 except:

    A. Make the IP address a command-line argument instead of prompting the user for it.
        ./binary_converter.py 10.88.17.23

    B. Simplify the script logic by using the flow-control statements that we learned in this class.

    C. Zero-pad the digits such that the binary output is always 8-binary digits long.  Strip off the leading '0b' characters.  For example,

        OLD:     0b1010
        NEW:    00001010

    D. Print to standard output using a dotted binary format.  For example,

        IP address          Binary
      10.88.17.23        00001010.01011000.00010001.00010111


    Note, you might need to use a 'while' loop and a 'break' statement for part C.
        while True:
            ...
            break       # on some condition (exit the while loop)

    Python will execute this loop again and again until the 'break' is encountered.

The first thing we want to do is to import the module sys because we are going to be working with command line arguments.

import sys

Continue reading

OpenSwitch Network Operating System

The Open Network Install Environment (ONIE) is an open source install environment that gives a switch user a choice to download ONIE compliant Network Operation System (NOS) to bare metal network switches. The OpenSwitch is community based, open source NOS that runs on hardware based on ONIE.

The goal of this article is to show how to build OpenSwitch Virtual Machine appliance, describe its capabilities and to introduce three methods for managing OpenSwitch. The OpenSwitch VM appliance was created by OpenSwitch project for training and testing purpose. It uses software data plane to forward the packets but it is not intended to be used as a virtual switch for connecting virtual machines. OpenSwitch supports many L2, L3 protocols such as STP, LACP, LLDP, OSPF, BGP, DHCP, TFTP, NTP, SSH, SNMP and others. These protocols run as separate daemons and they were integrated from another open-source projects.

For instance Quagga project provides L3 functionality to Openswitch. Quagga modules ops-ospf and ops-bgp update active routes in OpenvSwitch database (OVSDB). The module ops-zebra reads routes from OVSDB and install them to the kernel. Static routes are also stored in OVSDB, read by ops-zebra module and installed to the kernel. In order to use Continue reading

Users take the cheese to solve data breaches

Cheese Movers International’s restructuring resulted in some employees being unhappy with either their new role or the new management. And unhappy employees, especially those who know the system well and have access, can become major problems for companies.Verizon’s RISK Team was called in because the multinational company had heard rumblings among the disgruntled employees and found some negative comments online. While there was no evidence of a data breach, Cheese Movers' upper management was concerned something was coming.This is just one case found in Verizon’s recently released annual breach report, which examines some of the cases where the RISK Team was called in to hunt down culprits. The “ride–along edition” of Verizon’s report provides a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed, who defaced a website or where a leak is coming from. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here

Users take the cheese to solve data breaches

Cheese Movers International’s restructuring resulted in some employees being unhappy with either their new role or the new management. And unhappy employees, especially those who know the system well and have access, can become major problems for companies.Verizon’s RISK Team was called in because the multinational company had heard rumblings among the disgruntled employees and found some negative comments online. While there was no evidence of a data breach, Cheese Movers' upper management was concerned something was coming.This is just one case found in Verizon’s recently released annual breach report, which examines some of the cases where the RISK Team was called in to hunt down culprits. The “ride–along edition” of Verizon’s report provides a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed, who defaced a website or where a leak is coming from. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here

Ride along to solve these data breaches

Riding alongImage by Daimler AGVerizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed or where a leak is. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here(Insider Story)

6 senators say U.S. firms are hiding their offshoring

Publicly traded companies are required by law to disclose only their global headcount, and that's all the information many of them provide. That keeps certain information a secret. These companies may be shrinking their U.S. headcount as they grow their overseas workforces. Six U.S. senators want to change that.These senators -- all Democrats -- are co-sponsoring legislation, introduced Thursday, that would require publicly traded companies to disclose their numbers of employees by location, by state, and by country."It's hard to hold companies accountable for gaming the system and shipping jobs overseas when it's not even known where their employees are located," said Sen. Gary Peters (D-Mich.), in a statement. One of the key reasons this bill, called the Outsourcing Accountability Act, was introduced is because it is difficult to find information about the number of jobs that are moved offshore.To read this article in full or to leave a comment, please click here

28% off Logitech G502 Proteus Spectrum RGB Tunable Gaming Mouse – Deal Alert

The G502 features the most advanced optical sensor for maximum tracking accuracy. Customize RGB lighting or sync it with other Logitech G products, set up custom profiles for your games, adjust sensitivity from 200 up to 12,000 DPI and position five 3.6g weights for just the right balance and feel. The G502 averages 4.5 out of 5 stars from over 1,000 people on Amazon, where its typical list price of $80 has been reduced to $58. See it now on Amazon.To read this article in full or to leave a comment, please click here

30% off Logitech G502 Proteus Spectrum RGB Tunable Gaming Mouse – Deal Alert

The G502 features the most advanced optical sensor for maximum tracking accuracy. Customize RGB lighting or sync it with other Logitech G products, set up custom profiles for your games, adjust sensitivity from 200 up to 12,000 DPI and position five 3.6g weights for just the right balance and feel. The G502 averages 4.5 out of 5 stars from over 1,000 people on Amazon, where its typical list price of $80 has been reduced to $56. See it now on Amazon.To read this article in full or to leave a comment, please click here

No Sound In Exported Video – Final Cut Pro X 10.3.2

Ran into an issue today where audio was working normally in Final Cut Pro X 10.3.2, but the exported video had no sound. The video and sound were originally recorded using a Canon G7X Mark II.

The fix was to delete Final Cut Pro X preferences, as detailed by Apple here. In short…

  1. Quit FCPX.
  2. Press Command-Option when re-launching FCPX. You’ll be given an option to delete your FCPX preferences.
  3. Delete your preferences.

That will definitely result in some interface trauma for you, as FCPX won’t remember where your libraries are. I’m not sure what other settings you’d invested in that might also be forgotten — probably a lot of things. I’m still relatively new to FCPX, so the hit wasn’t too hard to handle. But still. Yuck.

Yuck or not, that worked. Once I pointed FCPX at my libraries and built a new project for my simple video, exporting rendered not just video, but audio too. And all was right with the world.


Ethan Banks writes & podcasts about IT, new media, and personal tech.
about | subscribe | @ecbanks