Archive

Category Archives for "Networking"

Verizon revives its unlimited data plan after purging legacy unlimited data plan users

Verizon is just full of surprises. Over the past year, Verizon went negative on its legacy unlimited data customers by purging anyone using too much data. Now, the company wants more unlimited data customers—at least up to a point. Starting Monday, you can sign up for the company’s new unlimited data plan, called Verizon Unlimited.For $80 a month, Verizon customers receive unlimited 4G data on a single smartphone. Anyone with multiple devices can add two lines on Verizon Unlimited for $70 per line per month ($140 total), three for $54 ($162 total) per line, or four for $45 ($180 total) per line.To read this article in full or to leave a comment, please click here

Tim Cook: Augmented reality is the future, and fake news is ruining everything

While Apple CEO Tim Cook is looking forward to his company’s next big idea, which sounds like it’s going to be augmented reality-related, he’s also stunned by the tech industry’s inability to stem the tide of fake news.In between tours of schools and meetings with developers in a trip to Britain, Cook spoke excitedly about the potential of AR in Apple devices to The Independent, and was equally impassioned about the scourge of fake news in comments to The Telegraph.To read this article in full or to leave a comment, please click here

Blocking a DDoS Upstream

In the first post on DDoS, I considered some mechanisms to disperse an attack across multiple edges (I actually plan to return to this topic with further thoughts in a future post). The second post considered some of the ways you can scrub DDoS traffic. This post is going to complete the basic lineup of reacting to DDoS attacks by considering how to block an attack before it hits your network—upstream.

The key technology in play here is flowspec, a mechanism that can be used to carry packet level filter rules in BGP. The general idea is this—you send a set of specially formatted communities to your provider, who then automagically uses those communities to create filters at the inbound side of your link to the ‘net. There are two parts to the flowspec encoding, as outlined in RFC5575bis, the match rule and the action rule. The match rule is encoded as shown below—

There are a wide range of conditions you can match on. The source and destination addresses are pretty straight forward. For the IP protocol and port numbers, the operator sub-TLVs allow you to specify a set of conditions to match on, and whether to AND the Continue reading

The Importance of Carrier-grade VNFs

GENBAND Sanjay Bhatia Interview Serving as Vice President of Solutions Marketing and Strategy for GENBAND, Sanjay Bhatia oversees the company’s product marketing organization and alignment of GENBAND’s go-to-market strategy across different market segments including NFV, Cloud, Enterprise Unified Communications, MSO, and Wireless. Bhatia is an accomplished telecommunications professional with over 28 years of wide-ranging global experience. Bhatia has held... Read more →

Recent malware attacks on Polish banks tied to wider hacking campaign

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from more than 30 countries.Researchers from Symantec and BAE Systems linked the malware used in the recently discovered Polish attack to similar attacks that have taken place since October in other countries. There are also similarities to tools previously used by a group of attackers known in the security industry as Lazarus.The hackers compromised websites that were of interest to their ultimate targets, a technique known as watering hole attacks. They then injected code into them that redirected visitors to a custom exploit kit.To read this article in full or to leave a comment, please click here

Recent malware attacks on Polish banks tied to wider hacking campaign

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from more than 30 countries.Researchers from Symantec and BAE Systems linked the malware used in the recently discovered Polish attack to similar attacks that have taken place since October in other countries. There are also similarities to tools previously used by a group of attackers known in the security industry as Lazarus.The hackers compromised websites that were of interest to their ultimate targets, a technique known as watering hole attacks. They then injected code into them that redirected visitors to a custom exploit kit.To read this article in full or to leave a comment, please click here

Most Americans with knowledge of employer’s cybersecurity wouldn’t want to be a customer

Today Kaspersky Lab and HackerOne released the report, “Hacking America: Cybersecurity Perception.” Some of its revelations include that most Americans wouldn’t want to be a customer of their employers since they don’t trust their employers to protect their personal data; also, almost half the people surveyed think America is more vulnerable to cyber-espionage/nation-sponsored cyberattacks with Donald Trump as president.The study, based on answers provided by 5,000 US adults who were surveyed in December 2016, revealed that despite all the cybersecurity news coverage, American consumers and businesses still need a better understanding of cyberthreats and how to protect their personal and sensitive business data online.To read this article in full or to leave a comment, please click here

Most Americans with knowledge of employer’s cybersecurity wouldn’t want to be a customer

Today Kaspersky Lab and HackerOne released the report, “Hacking America: Cybersecurity Perception.” Some of its revelations include that most Americans wouldn’t want to be a customer of their employers since they don’t trust their employers to protect their personal data; also, almost half the people surveyed think America is more vulnerable to cyber-espionage/nation-sponsored cyberattacks with Donald Trump as president.The study, based on answers provided by 5,000 US adults who were surveyed in December 2016, revealed that despite all the cybersecurity news coverage, American consumers and businesses still need a better understanding of cyberthreats and how to protect their personal and sensitive business data online.To read this article in full or to leave a comment, please click here

Intel now supports Vulkan on Windows 10 PCs

Intel is bringing more options to improve gaming and virtual reality experiences on Windows PCs with official support for Vulkan APIs (application programming interfaces).Vulkan is similar to DirectX 12 and can be used for many applications, but it is most relevant to visual applications like games.Games and VR applications written in Vulkan will work with GPUs integrated into Intel's 7th Generation chips code-named Kaby Lake and 6th Generation chips code-named Skylake. It will also support the Intel HD Graphics 505 GPU in Pentium chips code-named Apollo Lake.To read this article in full or to leave a comment, please click here

Apple joins Wireless Power Consortium, charging up iPhone 8 rumor

Apple has joined the consortium behind the Qi wireless charging system, supercharging rumors that owners of future an iPhone could live tangle-free.Last week, a financial analyst claimed Apple will release three new iPhones with wireless charging capabilities this year, reviving an on-again, off-again rumor about the next-generation iPhone's capabilities.The appearance of Apple's name on the membership list of the Wireless Power Consortium, Qi's creator, over the last week adds credence to that rumor. Its name was not on the list cached by Google's search engine last Tuesday.To read this article in full or to leave a comment, please click here

Storage tank operator turns to IoT for energy savings

Royal Vopak N.V. is a leading independent tank storage provider for the oil and chemical industries, operating 67 terminals in 25 countries. Chris Sheldon, Terminal Manager for the company’s operation in Savannah, GA, recently oversaw the implementation of an Internet of Things deployment that is enabling the terminal to minimize energy usage, which should lead to significant cost savings.  Sheldon shared the story with Network World Editor in Chief John Dix. Vopak Chris Sheldon, Terminal Manager, Vopak Terminal Savannah, Inc.To read this article in full or to leave a comment, please click here

Extreme, NRG Stadium score big with Super Bowl Wi-Fi performance

Super Bowl LI will be remembered for a number of things. The Patriots had the largest comeback in Super Bowl history. Like all Atlanta sports teams, the Falcons choked when it mattered most. Also, Tom Brady won his fifth Super Bowl to cement his place as the second greatest QB of all time, behind the illustrious Joe Montana. More importantly though, Super Bowl LI was the most connected and engaged sporting event to date, as the fans in NRG Stadium in Houston appeared to be very busy using their phones to take pictures, Tweet, Facebook, send messages and other activities. A year ago, I wrote a post about how the network performed for Super Bowl 50, so I thought it would be worth looking at how things changed between then and now. To read this article in full or to leave a comment, please click here

Extreme, NRG Stadium score big with Super Bowl Wi-Fi performance

Super Bowl LI will be remembered for a number of things. The Patriots had the largest comeback in Super Bowl history. Like all Atlanta sports teams, the Falcons choked when it mattered most. Also, Tom Brady won his fifth Super Bowl to cement his place as the second greatest QB of all time, behind the illustrious Joe Montana. More importantly though, Super Bowl LI was the most connected and engaged sporting event to date, as the fans in NRG Stadium in Houston appeared to be very busy using their phones to take pictures, Tweet, Facebook, send messages and other activities. A year ago, I wrote a post about how the network performed for Super Bowl 50, so I thought it would be worth looking at how things changed between then and now. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Coder turns AWS IoT Button into ACLU donation button

During World War II, President Franklin Roosevelt ordered people of Japanese descent, many American citizens, to be relocated to internment camps. Even those with as little as one-sixteenth Japanese blood were interned. Over 110,000 Japanese Americans from California, Oregon, Washington and Arizona were affected. Many had just six days to sell all their possessions before being interned!President Ronald Reagan signed the Civil Liberties Act in 1988, which apologized for the internment on behalf of the U.S. government. The legislation admitted that government actions were based on "race prejudice, war hysteria, and a failure of political leadership."To read this article in full or to leave a comment, please click here

57% off Anker LED Water-Resistant Rechargeable 1300 Lumen Flashlight – Deal Alert

The high-performance Cree LED XM-L2 chip delivers 50,000 hours of intense brightness at a true 1300 lumens. Sweep bright light beyond the length of two football fields. The Anker Bolder torch has a full range of light modes for every situation: a powerful high-beam, balanced medium-beam, energy-saving & less dazzling low-beam, high-visibility strobe, and emergency SOS. It's rechargeable battery generates 6 hours of undiminishing light on a charge. It's body is constructed of professional durable materials, and is IP67 rated for water resistance. Rated 4.5 out of 5 stars from over 100 people on Amazon (84% rate a full 5 -- see reviews here), its $112 list price is reduced 57% to just $47.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Python – Kirk Byers Course Week 1 Part 2

In the second part of assignments for the first week of Kirk Byers Python for Network Engineers class we will be working with IPv6 addresses.

We start with the following IPv6 address: FE80:0000:0000:0000:0101:A3EF:EE1E:1719.

The goal is then to split this address into individual parts. The delimiter in an IPv6 address is a colon. For an IPv4 address we would have used a dot instead. Python has a built-in function for splitting strings. To split the address we use this function and tell Python that a colon is our delimiter.

print("IPv6 address split:")
print(ipv6_split)
print(type(ipv6_split))

This means that we have turned our string into a list, consisting of eight parts of the IPv6 address.

daniel@daniel-iperf3:~/python/Week1$ python3 ipv6.py 
IPv6 address split:
['FE80', '0000', '0000', '0000', '0101', 'A3EF', 'EE1E', '1719']
<class 'list'>

To rejoin the address again the built-in function “join()” will be used. The syntax for this function is a bit awkward besides that it’s easy to use.

ipv6_new = ":".join(ipv6_split) 

print("IPv6 address rejoined:") 
print(ipv6_new) 
print(type(ipv6_new))

First we tell Python to put a colon between all the parts we are joining. The output then looks like this:

daniel@daniel-iperf3:~/python/Week1$ python3 ipv6.py 
IPv6 address rejoined:
FE80:0000:0000:0000:0101:A3EF:EE1E:1719
<class 'str'>

Note that the Continue reading