Archive

Category Archives for "Networking"

Hacker takes out dark web hosting service using well-known exploit

A hacker is proving that sites on the dark web, shrouded in anonymity, can easily be compromised.    On Friday, the unnamed hacker began dumping a sizable database stolen from Freedom Hosting II onto the internet, potentially exposing its users. The hosting service, Freedom Hosting II, was known for operating thousands of sites that were accessible through the Tor browser; the "dark web" is essentially the encrypted network comprising Tor servers and browsers. But on Friday, the service appeared to be down. Its main landing page was replaced with a message saying that it had been hacked. Allegedly, Freedom Hosting II had been hosting child pornography sites, though its anonymous operator claimed to have a zero-tolerance policy toward such content, according to the hacker behind the breach.To read this article in full or to leave a comment, please click here

Hacker takes out dark web hosting service using well-known exploit

A hacker is proving that sites on the dark web, shrouded in anonymity, can easily be compromised.    On Friday, the unnamed hacker began dumping a sizable database stolen from Freedom Hosting II onto the internet, potentially exposing its users. The hosting service, Freedom Hosting II, was known for operating thousands of sites that were accessible through the Tor browser; the "dark web" is essentially the encrypted network comprising Tor servers and browsers. But on Friday, the service appeared to be down. Its main landing page was replaced with a message saying that it had been hacked. Allegedly, Freedom Hosting II had been hosting child pornography sites, though its anonymous operator claimed to have a zero-tolerance policy toward such content, according to the hacker behind the breach.To read this article in full or to leave a comment, please click here

What’s keeping enterprises from using G Suite?

While Google has spent the past year trying to woo enterprises to its G Suite productivity apps, it’s still the underdog compared to Microsoft Office, at least among large businesses. So what’s keeping it from broader appeal?One of the biggest hurdles for Google achieving broader enterprise adoption is just the fact that the company’s products aren't identical to Word, Excel, PowerPoint, Outlook, and other Microsoft Office apps, Gartner Senior Research Analyst Joe Mariano said."Enterprises have been ingrained in the Microsoft stack for essentially the beginning of time, it feels like," Mariano said. "[Enterprises] have problems shifting away from that, because they have a lot of investments, either in customizations or how they're using the tools."To read this article in full or to leave a comment, please click here

A Windows Cloud build just leaked, and this is what we learned

Microsoft's mysterious Windows Cloud is supposedly a stripped-down version of Microsoft’s operating system that runs only Windows Store apps. Microsoft's not commenting, but an early build that leaked over the weekend appears to be authentic and gives further tantalizing hints of what the company may have in mind. Windows Cloud intrigues Microsoft watchers because of its uncanny resemblance to Windows RT, Microsoft’s failed ARM-based platform. It, too, could only run Windows Store apps, plus desktop versions of Internet Explorer and Microsoft Office. There are numerous reasons why RT never succeeded, but the gist is there weren’t enough apps and nobody wanted to run a hobbled PC.To read this article in full or to leave a comment, please click here

One-third of iPhones are the Plus model

It's no secret that the tablet market is in something of a freefall. It is being squeezed on the top end by high-end laptops that have detachable touch screens and on the bottom by large phones. Plus, the chief advocate for tablets was Steve Jobs, who is no longer with us, and no one has stepped forward to champion the tablet. NPD Group reports that tablet sales have dropped 15 percent from 2015 to 2016. It would have been worse if not for Amazon practically giving away the low-cost Amazon Fire Tablet. There is also some success to be had with the iPad Pro and Microsoft Surface Pro 4. + Also on Network World: iPhone 8 likely to feature 'wraparound' display design + But the real damage is being done by large phones, sometimes called phablets (a portmanteau for "phone-tablet"). In the fourth quarter of 2016, Apple sold just 13 million iPads, a 19 percent drop from the same period in 2015. However, Consumer Intelligence Research Partners says the iPhone Plus, with its 6.23-in. diagonal screen, made up 35 percent of the iPhone installed base as of the end of last year, up from 25 percent in Continue reading

TV maker Vizio pays $2.2M to settle complaint that it spied on users

Popular smart TV maker Vizio will pay US $2.2 million to settle complaints that it violated customers' privacy by continuously monitoring their viewing habits without their knowledge. Beginning in February 2014, the California TV maker tracked what TV shows customers were watching on 11 million TV sets sold in the U.S., the U.S. Federal Trade Commission and the Office of the New Jersey Attorney General said in a complaint, released Monday. Vizio smart TVs captured "second-by-second" information about video displayed, including video from consumer cable service, broadband, set-top boxes, DVDs, over-the-air broadcasts, and streaming devices, according to the complaint.To read this article in full or to leave a comment, please click here

TV maker Vizio pays $2.2M to settle complaint that it spied on users

Popular smart TV maker Vizio will pay US $2.2 million to settle complaints that it violated customers' privacy by continuously monitoring their viewing habits without their knowledge.Beginning in February 2014, the California TV maker tracked what TV shows customers were watching on 11 million TV sets sold in the U.S., the U.S. Federal Trade Commission and the Office of the New Jersey Attorney General said in a complaint, released Monday.Vizio smart TVs captured "second-by-second" information about video displayed, including video from consumer cable service, broadband, set-top boxes, DVDs, over-the-air broadcasts, and streaming devices, according to the complaint.To read this article in full or to leave a comment, please click here

How to catch a 400lb drone traveling at full speed

Catching a full-sized military drone traveling at full speed without destroying it midflight is no easy task. But DARPA this week said a research project it has been working – known as SideArm -- is doing just that and more. DARPA said that SideArm developer Aurora Flight Sciences has successfully tested a full-scale system that repeatedly captured a 400-pound Lockheed Martin Fury unmanned aircraft accelerated to flight speed via an external catapult. A Fury can hit over 130MPH.+More on Network World: Hot stuff: The coolest drones+To read this article in full or to leave a comment, please click here

How to catch a 400lb drone traveling at full speed

Catching a full-sized military drone traveling at full speed without destroying it midflight is no easy task. But DARPA this week said a research project it has been working – known as SideArm -- is doing just that and more. DARPA said that SideArm developer Aurora Flight Sciences has successfully tested a full-scale system that repeatedly captured a 400-pound Lockheed Martin Fury unmanned aircraft accelerated to flight speed via an external catapult. A Fury can hit over 130MPH.+More on Network World: Hot stuff: The coolest drones+To read this article in full or to leave a comment, please click here

FreeDOS 1.2: Why DOS is amazing in 2017

Right now, as I sit here typing these words, it is February of the year 2017.The words of which I speak? They are entirely about DOS. Yes—that DOS. The one that powered so many computers throughout the 1980s and a chunk of the 1990s. The one with a big, low-resolution “C:>”. The one you installed with floppy disks often onto a hard drive measured in megabytes. DOS. You see, back on December 25, something miraculous happened. Something that changed the world forever: FreeDOS 1.2 was released. To read this article in full or to leave a comment, please click here

Malware distributors are switching to less suspicious file types

After aggressively using JavaScript email attachments to distribute malware for the past year, attackers are now switching to less suspicious file types to trick users.Last week, researchers from the Microsoft Malware Protection Center warned about a new wave of spam emails that carried malicious .LNK files inside ZIP archives. Those files had malicious PowerShell scripts attached to them.PowerShell is a scripting language for automating Windows system administration tasks. It has been abused to download malware in the past and there are even malware programs written entirely in PowerShell.To read this article in full or to leave a comment, please click here

Malware distributors are switching to less suspicious file types

After aggressively using JavaScript email attachments to distribute malware for the past year, attackers are now switching to less suspicious file types to trick users.Last week, researchers from the Microsoft Malware Protection Center warned about a new wave of spam emails that carried malicious .LNK files inside ZIP archives. Those files had malicious PowerShell scripts attached to them.PowerShell is a scripting language for automating Windows system administration tasks. It has been abused to download malware in the past and there are even malware programs written entirely in PowerShell.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How ZeroStack plans to deliver ‘self-driving’ clouds

ZeroStack is an IT management vendor. More specifically, it provides tooling that lets organizations turn bare-metal (i.e., physical) servers into cloud infrastructure. Basically ZeroStack -- like cloud platforms from OpenStack, Microsoft and others -- wants to make physical infrastructure work like the public cloud. ZeroStack offers the operating tools and the self-service platform that helps customers make decisions about capacity planning, troubleshooting and optimized placement of applications. On top of that, ZeroStack offers a Bitnami-like integrated app store that allows organizations to offer their end users a "one-click" installation of popular applications onto their cloud platform. Finally, ZeroStack is integrated with public clouds to offer migration between on-premises and public cloud infrastructure.To read this article in full or to leave a comment, please click here

Prime Members get 35% off Samsung Gear 360, 360-degree High-Res VR Camera – Deal Alert

The Gear 360 is smaller than a baseball, so you can just hold it and shoot. Or set it down on the included tripod and live in the moment. Look all around you -- that’s what you capture with the Gear 360. Every angle, all at once, every time. Play videos back, trim and instantly share your creation on YouTube, Facebook or Samsung VR. Right now, if you're an Amazon Prime member (or have a free trial, located right here) the Gear 360 is significantly discounted from its typical list price of $350. With the current 35% off deal you can get it now for just $225.99 on Amazon, where it averages 4 out of 5 stars (read recent reviews).  See the discounted Samsung Gear 360-degree camera now on Amazon.To read this article in full or to leave a comment, please click here

How To: Setting up a GRE or VXLAN tunnel on Linux


This is a guide to setting up VXLAN/GRE tunnels between two linux machines, be it virtual or physical. There are so many guides and reference pages on the internet but I couldn't find one that is comprehensive yet simple. Most popular method of setting up tunnels in linux seems to be using OpenvSwitch. There are a few interesting posts [redhat][Brent Sailsbury's blog][David Mahler - Youtube] out there that describe tunnel setup using OVS but few that leverages linux network stack directly. The closest I could find were a kernel reference page for VXLAN and a presentation from LinuxCon2013.

In this post both methods - OpenvSwitch & only linux networking will be discussed. When we speak about VXLAN we normally discuss multicast groups and how endpoints (VTEP) learn and populate both the fdb (forwarding database entry) and the mdb (multicast group database entry). This article describes "not using" a multicast group and dynamic learning when setting the tunnel up natively, i.e. without OVS. Both methods require a fairly newer kernel (3.7 and greater) and needs the "vxlan" kernel module to be loaded. lsmod can be used to check if this Continue reading

Why Intel’s Unite software survived last year’s brutal product purge

At first glance, Intel's Unite software comes across as an anomaly. What future does the collaboration software have in the chipmaker's future?For now, the software is linked to Intel's PC chips, which is a core business. But it's emerging as a component of the company's virtual reality, internet of things, and server businesses, which are all central to Intel's future growth strategy after a massive restructuring last year.Unite, which was released in 2015, allows remote and on-site users to log in to meetings and share documents and whiteboards. It works with Macs and Windows PCs as well as iPads and Android tablets, and it supports software like Skype for Business.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The future isn’t cloud. It’s multi-cloud

Cloud computing was supposed to simplify IT environments. Now, according to a recent study by Microsoft and 451 Research, nearly a third of organizations work with four or more cloud vendors. It would seem multi-cloud is the future of cloud computing. But what is driving this trend?Some organizations simply want to have more options—using multiple cloud providers to support different applications and workloads mean they can use the solution best suited to their needs. For example, an organization’s core applications may need resilient applications that can run even if local power is lost or that can expand or contract their capacity depending on workload.To read this article in full or to leave a comment, please click here