Archive

Category Archives for "Networking"

HPE acquires security startup Niara to boost its ClearPass portfolio

Hewlett Packard Enterprise has acquired Niara, a startup that uses machine learning and big data analytics on enterprise packet streams and log streams to detect and protect customers from advanced cyberattacks that have penetrated perimeter defenses. The financial terms of the deal were not disclosed. Operating in the User and Entity Behavior Analytics (UEBA) market, Niara’s technology starts by automatically establishing baseline characteristics for all users and devices across the enterprise and then looking for anomalous, inconsistent activities that may indicate a security threat, Keerti Melkote, senior vice president and general manager of HPE Aruba and cofounder of Aruba Networks, wrote in a blog post on Wednesday.To read this article in full or to leave a comment, please click here

HPE acquires security startup Niara to boost its ClearPass portfolio

Hewlett Packard Enterprise has acquired Niara, a startup that uses machine learning and big data analytics on enterprise packet streams and log streams to detect and protect customers from advanced cyberattacks that have penetrated perimeter defenses. The financial terms of the deal were not disclosed. Operating in the User and Entity Behavior Analytics (UEBA) market, Niara’s technology starts by automatically establishing baseline characteristics for all users and devices across the enterprise and then looking for anomalous, inconsistent activities that may indicate a security threat, Keerti Melkote, senior vice president and general manager of HPE Aruba and cofounder of Aruba Networks, wrote in a blog post on Wednesday.To read this article in full or to leave a comment, please click here

Hackers are seeking out company insiders on the black market

If you’re the CEO of a company, here’s another threat you need to worry about: hackers trying to recruit your employees for insider-related crimes.Researchers at security firms RedOwl and IntSights have noticed growing activity from online black market dealers trying to recruit company employees for insider trading and cashing out stolen credit card numbers. These dealers are appearing on underground forums located on the dark web, which are accessible through Tor, a browser designed for anonymous web surfing, according to the researchers, who published their findings on Tuesday. To read this article in full or to leave a comment, please click here

Hackers are seeking out company insiders on the black market

If you’re the CEO of a company, here’s another threat you need to worry about: hackers trying to recruit your employees for insider-related crimes.Researchers at security firms RedOwl and IntSights have noticed growing activity from online black market dealers trying to recruit company employees for insider trading and cashing out stolen credit card numbers. These dealers are appearing on underground forums located on the dark web, which are accessible through Tor, a browser designed for anonymous web surfing, according to the researchers, who published their findings on Tuesday. To read this article in full or to leave a comment, please click here

Trump may ask businesses to boost cybersecurity

President Donald Trump may be seeking more cooperation from private businesses to shore up the defense of critical infrastructure that they control.The signing of an executive order on cybersecurity was canceled unexpectedly Tuesday, but a draft of the order was leaked to The Washington Post.In it, Trump calls for, “…economic and other incentives to: induce private sector owners and operators of the Nation’s critical infrastructure to maximize protective measures; invest in cyber enterprise risk management tools and services; and adopt best practices with respect to processes and technologies necessary for the increased sharing of and response to real-time cyber threat information.”To read this article in full or to leave a comment, please click here

Trump may ask businesses to boost cybersecurity

President Donald Trump may be seeking more cooperation from private businesses to shore up the defense of critical infrastructure that they control.The signing of an executive order on cybersecurity was canceled unexpectedly Tuesday, but a draft of the order was leaked to The Washington Post.In it, Trump calls for, “…economic and other incentives to: induce private sector owners and operators of the Nation’s critical infrastructure to maximize protective measures; invest in cyber enterprise risk management tools and services; and adopt best practices with respect to processes and technologies necessary for the increased sharing of and response to real-time cyber threat information.”To read this article in full or to leave a comment, please click here

Computing conference to celebrate 50 years of Turing Award

The Association for Computing Machinery (ACM) has announced it will celebrate 50 years of the A.M. Turing Award -- dubbed the "Nobel Prize of Computing -- with a (tech) star-studded conference in San Francisco this summer.The two-day event, to be held June 23-24, will "explore how computing has evolved and where the field is headed," according to the ACM.MORE: Why there's no official Nobel Prize in ComputingACM, which boasts of nearly 100,000 computing professional and student members around the world, is calling the event the Celebration of 50 Years of the ACM Turing Award. If you can't attend in person, be aware that a live stream will be available.To read this article in full or to leave a comment, please click here

Computing conference to celebrate 50 years of Turing Award

The Association for Computing Machinery (ACM) has announced it will celebrate 50 years of the A.M. Turing Award -- dubbed the "Nobel Prize of Computing -- with a (tech) star-studded conference in San Francisco this summer.The two-day event, to be held June 23-24, will "explore how computing has evolved and where the field is headed," according to the ACM.MORE: Why there's no official Nobel Prize in ComputingACM, which boasts of nearly 100,000 computing professional and student members around the world, is calling the event the Celebration of 50 Years of the ACM Turing Award. If you can't attend in person, be aware that a live stream will be available.To read this article in full or to leave a comment, please click here

Raspberry Pi roundup: Secret messages from your washing machine, smelling the fruit, and Rubik’s Cubes

The one-time pad, familiar from a thousand spy novels, is still among the most secure possible ways to encode a message to keep it safe from prying eyes. A cipher based on truly random numbers, with the keys held only by the sending and receiving parties, is theoretically unbreakable.And thanks to the Raspberry Pi, your messages to the Glorious Motherland can be proof against western imperialist snooping – the Pi, according to an article by Nate Drake for Techradar, is a pretty good source of randomness, and can generate its own sequences of gibberish numbers, which you can print out using an Adafruit Printer and use.To read this article in full or to leave a comment, please click here

Gmail will push users further away for XP and Vista

Google quietly announced Tuesday that Gmail will stop supporting older versions of its Chrome browser soon, in a move that will put another nail in the coffins of Windows XP and Windows Vista.Users of Chrome version 53 and older editions of the browser could start being redirected to the basic HTML version of Gmail as early as December, the company said in a blog post. Starting next week, users who will be affected by the change will start seeing a banner at the top of Gmail telling them to upgrade to an up-to-date version of Google’s browser.The affected browser versions include Chrome v49, the last version of the software that supports XP and Vista. While Microsoft officially ended support for XP more than two and a half years ago, Gmail has continued to work with it. Vista Service Pack 2 will reach the end of its extended support period on April 11.To read this article in full or to leave a comment, please click here

Gmail will push users further away from XP and Vista

Google quietly announced Tuesday that Gmail will stop supporting older versions of its Chrome browser soon, in a move that will put another nail in the coffins of Windows XP and Windows Vista. Users of Chrome version 53 and older editions of the browser could start being redirected to the basic HTML version of Gmail as early as December, the company said in a blog post. Starting next week, users who will be affected by the change will start seeing a banner at the top of Gmail telling them to upgrade to an up-to-date version of Google’s browser.To read this article in full or to leave a comment, please click here

WhatsApp reduces spam, despite end-to-end encryption

Can a spam filter work even without reading the content of your messages?WhatsApp thinks so. Since last April, the messenger app has been successfully fighting spam abuse, even as it’s been using end-to-end encryption.That encryption means that no one -- not even WhatsApp -- can read the content of your messages, except for the recipient.More privacy, however, can raise issues about spam detection. If WhatsApp can’t scan your messages for suspicious content, say for advertisements peddling cheap Viagra, then how can it effectively filter them out?To read this article in full or to leave a comment, please click here

WhatsApp reduces spam, despite end-to-end encryption

Can a spam filter work even without reading the content of your messages?WhatsApp thinks so. Since last April, the messenger app has been successfully fighting spam abuse, even as it’s been using end-to-end encryption.That encryption means that no one -- not even WhatsApp -- can read the content of your messages, except for the recipient.More privacy, however, can raise issues about spam detection. If WhatsApp can’t scan your messages for suspicious content, say for advertisements peddling cheap Viagra, then how can it effectively filter them out?To read this article in full or to leave a comment, please click here

AMD sets Ryzen up for a strong start as chip battle with Intel looms

As a pesky underdog, AMD challenged Intel in chip innovation until the mid-2000s. AMD churned out innovations like dual-core and 64-bit chips, which kept Intel on its toes.But some disastrous technological and management decisions cost AMD dearly, and over time, buyers began to consider its processors inferior to Intel's chips. Intel ran away with PC and server chip market share.AMD now is looking to rally its dwindling fan base with a series of Zen-based chips this year for desktops, servers, and laptops. The hyped-up Zen chips are expected to be good, and even Intel readily acknowledges the stiff competition coming its way.AMD promises that Zen chips will deliver a 40 percent improvement in instructions per cycle, an important metric for chip performance. That number is impressive, considering most chips based on a new architecture have typically boasted CPU improvements of up to 20 percent.To read this article in full or to leave a comment, please click here

25% off Logitech Professional Presenter R800, Presentation Wireless Presenter with Laser Pointer – Deal Alert

The Logitech Professional Presenter R800, with a brilliant green laser pointer, puts you in complete control of your presentation and makes it easy to direct your audience's attention to specific information from across the room - even on flat panel displays and in brightly lit rooms. To keep you focused on the crowd and not the clock, the Professional Presenter R800 provides an easy-to-set timer with silent, vibrating alerts. When you're moving around the room to engage your audience, at a range of up to 100 feet (30 meters), a reception - level indicator on the LCD keeps you from wandering too far. The intuitive slideshow controls help you find buttons easily by touch, and the compact design allows you to take it with you wherever you go.  To read this article in full or to leave a comment, please click here

Juniper heads to the clouds with Unite

Not to state the obvious, but the cloud has been growing in popularity over the past decade. However, contrary to much of the rhetoric I hear about today, the cloud is not going to kill of private data centers any time soon. The explosion in data has driven growth in both private data centers and public clouds.Underscoring that point is that almost all the IT leaders I speak to plan to do some kind of hybrid cloud where they leverage the strengths of both.The cloud is a new compute model, but what’s different about it from other compute paradigms before it is that it is highly network centric. Everyone loves the cloud. It’s great, it’s elastic and a bunch of other things. But it won’t provide the results companies are looking for without the right network underneath it. To read this article in full or to leave a comment, please click here

Juniper heads to the clouds with Unite

Not to state the obvious, but the cloud has been growing in popularity over the past decade. However, contrary to much of the rhetoric I hear about today, the cloud is not going to kill of private data centers any time soon. The explosion in data has driven growth in both private data centers and public clouds.Underscoring that point is that almost all the IT leaders I speak to plan to do some kind of hybrid cloud where they leverage the strengths of both.The cloud is a new compute model, but what’s different about it from other compute paradigms before it is that it is highly network centric. Everyone loves the cloud. It’s great, it’s elastic and a bunch of other things. But it won’t provide the results companies are looking for without the right network underneath it. To read this article in full or to leave a comment, please click here

Docker’s namespaces – See them in CentOS

In the Docker Networking Cookbook (I got my copy directly from Pact Publishing), Jon Langemak explains why the iproute2 utilities can't see Docker's network namespaces: Docker creates its namespace objects in /var/run/docker/netns, but iproute2 expects to find them in /var/run/netns.

Creating a symlink from /var/run/docker/netns to /var/run/netns is the obvious solution:

 $ sudo ls -l /var/run/docker/netns  
total 0
-r--r--r--. 1 root root 0 Feb 1 11:16 1-6ledhvw0x2
-r--r--r--. 1 root root 0 Feb 1 11:16 ingress_sbox
$ sudo ip netns list
$ sudo ln -s /var/run/docker/netns /var/run/netns
$ sudo ip netns list
1-6ledhvw0x2 (id: 0)
ingress_sbox (id: 1)
$

But there's a problem. Look where this stuff is mounted:

 $ ls -l /var/run  
lrwxrwxrwx. 1 root root 6 Jan 26 20:22 /var/run -> ../run
$ df -k /run
Filesystem 1K-blocks Used Available Use% Mounted on
tmpfs 16381984 16692 16365292 1% /run
$

The symlink won't survive a reboot because it lives in a memory-backed filesystem. My first instinct was to have a boot script (say /etc/rc.d/rc.local) create the symlink, but there's a much better way.

Fine, I'm starting to like systemd

Systemd's tmpfiles.d is a really elegant way of handling touch files, symlinks, empty Continue reading