Archive

Category Archives for "Networking"

DARPA fortifies early warning system for power-grid cyber assault

The Defense Advanced Research Projects Agency (DARPA) continues to hone the system it hopes would quickly restore power to the U.S. electric grid in the event of a massive cyberattack. The research agency this week said it awarded defense system stalwart BAE Systems an $8.6 million contract to develop a system under its Rapid Attack Detection, Isolation and Characterization (RADICS) program that has as its central goal to develop technology that will detect and automatically respond to cyber-attacks on US critical infrastructure.+More on Network World: Cisco’s Jasper deal – one year, 18 million new IoT devices later, challenges remain+To read this article in full or to leave a comment, please click here

DARPA fortifies early warning system for power-grid cyber assault

The Defense Advanced Research Projects Agency (DARPA) continues to hone the system it hopes would quickly restore power to the U.S. electric grid in the event of a massive cyberattack. The research agency this week said it awarded defense system stalwart BAE Systems an $8.6 million contract to develop a system under its Rapid Attack Detection, Isolation and Characterization (RADICS) program that has as its central goal to develop technology that will detect and automatically respond to cyber-attacks on US critical infrastructure.+More on Network World: Cisco’s Jasper deal – one year, 18 million new IoT devices later, challenges remain+To read this article in full or to leave a comment, please click here

42% off AcuRite 5-in-1 Pro Weather Station with Remote Monitoring – Deal Alert

This high-precision 5-in-1 wireless weather sensor from AcuRite accurately measures the temperature, humidity, wind speed, wind direction and rain. PC Connect feature interfaces with a Windows computer via USB, allowing you to remotely view your weather from anywhere. Set up programmable weather alarms for temperature, humidity, wind, rain, dew point, heat index and storm alerts, as well as email and text alerts to notify you when conditions change or your presets are reached. The weather station averages 4 out of 5 stars from nearly 1,200 people on Amazon (read reviews), where the typical list is currently reduced 42% from $169.99 down to $99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Hackers use dangerous Petya ransomware in targeted attacks

In a case of no honor among thieves, a group of attackers has found a way to hijack the Petya ransomware and use it in targeted attacks against companies without the program creators' knowledge.A computer Trojan dubbed PetrWrap, being used in attacks against enterprise networks, installs Petya on computers and then patches it on the fly to suit its needs, according to security researchers from antivirus vendor Kaspersky Lab.The Trojan uses programmatic methods to trick Petya to use a different encryption key than the one its original creators have embedded inside its code. This ensures that only the PetrWrap attackers can restore the affected computers to their previous state.To read this article in full or to leave a comment, please click here

Hackers use dangerous Petya ransomware in targeted attacks

In a case of no honor among thieves, a group of attackers has found a way to hijack the Petya ransomware and use it in targeted attacks against companies without the program creators' knowledge.A computer Trojan dubbed PetrWrap, being used in attacks against enterprise networks, installs Petya on computers and then patches it on the fly to suit its needs, according to security researchers from antivirus vendor Kaspersky Lab.The Trojan uses programmatic methods to trick Petya to use a different encryption key than the one its original creators have embedded inside its code. This ensures that only the PetrWrap attackers can restore the affected computers to their previous state.To read this article in full or to leave a comment, please click here

OSPF Best Practices

OSPF Best Practices Understanding and using best practices is very important though may not be feasible in all networks due to budget , political or other technical constraints.   In this post I will explain the best practices on OSPF networks. This best practices come from my real life design and deployment experience , knowledge […]

The post OSPF Best Practices appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

How the IETF community is shaping technology to build a better society

The continued advancement in technological landscape enabling more people having Internet access in the global arena has meant that IETF (Internet Engineering Task Force) remains at the forefront of integrating technology with humanity. In fact, IETF has made significant use of social dimension to articulate its area of work and research. It is beautifully reflected in section 4.1 of the RFC 3935 wherein it states that “We want the Internet to be useful for communities that share our commitment to openness and fairness.  We embrace technical concepts such as decentralized control, edge-user empowerment and sharing of resources, because those concepts resonate with the core values of the IETF community”.

Anupam Agrawal

Prime Members Get 67% off NETGEAR N150 Wi-Fi Range Extender – Deal Alert

If your home has dead zones or areas where coverage is weak, boost your existing WiFi coverage with the Netgear N150 WiFi extender. For a limited time Amazon will sell it to Amazon Prime members (or anyone with a free trial, located here) for a significant 67% off its list price, or just $14.67. See this deal now on Amazon. To read this article in full or to leave a comment, please click here

Prime Members Get 67% off NETGEAR N150 Wi-Fi Range Extender – Deal Alert

If your home has dead zones or areas where coverage is weak, boost your existing WiFi coverage with the Netgear N150 WiFi extender. For a limited time Amazon will sell it to Amazon Prime members (or anyone with a free trial, located here) for a significant 67% off its list price, or just $14.67. See this deal now on Amazon. To read this article in full or to leave a comment, please click here

Why the subscription economy is the future of business

Zuora aims to win the next IT stack war – but it’s probably not the stack war that’s comes most readily to your mind. Tien Tzuo, CEO and co-founder of Zuora, wants to own the application stack that drives your subscription business and he believes that virtually every company will be a subscription business before long.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Microsoft Teams almost as bad as its beta

For months now, we’ve been hearing about Microsoft Teams, Microsoft’s much-heralded Slack killer for corporate chat. It’s now in official release (what Microsoft calls “general availability”) as part of Microsoft’s Office 365 enterprise plans. Sadly, Teams is underwhelming in its formal debut and definitely not a match for the hype Microsoft has been providing since October 2016. For a product so late to market, Microsoft should have delivered much more.To read this article in full or to leave a comment, please click here(Insider Story)

Taking A Stand Against Corruption

Over the last few months, I’ve noticed that some pages on this site have been returning what appear to be corrupted pages, looking something like this:

Corrupted Page

 

Or like this:

 

Pretty, aren’t they? Typically if the user hits refresh the page will come back as it should have done first time. I’ve been working for many weeks now to track down why this was happening. One thing I noted is that the corrupted files were smaller than the non-corrupted equivalent, suggesting that the file was either truncated or, more likely, compressed. Opening a downloaded file in a text editor showed that the header of these corrupted pages begins like this:

Some of you are probably feeling smug right now because you know that the first three bytes of a gzip file are 1F 8B 08. The ASCII code for 0x1F is Ctrl-_; there’s no code for 0x8B; ASCII 0x08 is the same as Ctrl-H (i.e. backspace). This should look familiar in the image above:  ^_ <8B> ^H. In other words, the client is receiving a GZIPped version of the page but presumably was told that the mime type was text/html. The end result is the garbled mess we saw above. So now Continue reading

Open-source BeagleBone Blue board aims for robots, drones

Before Raspberry Pi, BeagleBone was the go-to low-cost developer board for enthusiasts. It's still used by many, and a new BeagleBone board is now being targeted at robots.The US $79.95 BeagleBone Blue from BeagleBoard.org is a credit-card sized board with all the components needed to operate a robot or even a drone. It is open source, as its schematics have been published, and developers can replicate the board.Robots have unique requirements, and some computer boards specialize in specific features. For example, Nvidia's Jetson TX2 and Intel's Joule excel at computer vision and can give robots digital eyes to steer past obstacles. These boards also have powerful graphics processors and 64-bit CPUs.To read this article in full or to leave a comment, please click here