Archive

Category Archives for "Networking"

Uber orders investigation into employee’s charge of sexual harassment

Uber Technologies said Sunday it had ordered an urgent investigation after a former engineer triggered an uproar on social media, alleging sexual harassment, politics and discrimination at the ride-hailing company.In a blog post, Susan J. Fowler, who joined Uber in November 2015 and quit in December last year to join Stripe, alleged that her former manager in the company had said in messages over company chat that he was looking for women to have sex with.“It was clear that he was trying to get me to have sex with him, and it was so clearly out of line that I immediately took screenshots of these chat messages and reported him to HR,” Fowler wrote in a blog post that created a storm online.To read this article in full or to leave a comment, please click here

F-bombing cop recorded threatening to sic dog on driver to rip him up

Getting pulled over by the cops can be stressful, especially if one of the cops is shouting, cursing and threatening to sic a 90-pound dog on a motorist to rip the *bleep* out of him. The Atlantic City cop was dropping f-bombs all over the place, doing so at least 10 times in a one-minute, 20-second video clip of the traffic stop incident which was posted on Facebook.I don’t see how you could help but be offended by the video. If not by the cop’s spewing of foul-language, then by the threats the officer made. It is unclear why the cops pulled over the young men, but one of the cops nuked out upon discovering the driver was using his phone to film them. One of the unidentified cops said, “Listen there’s two ways that this can go. Take that phone and stick it out of my face. I’m not gonna tell you again.”To read this article in full or to leave a comment, please click here

F-bombing cop recorded threatening to sic dog on driver to rip him up

Getting pulled over by the cops can be stressful, especially if one of the cops is shouting, cursing and threatening to sic a 90-pound dog on a motorist to rip the *bleep* out of him. The Atlantic City cop was dropping f-bombs all over the place, doing so at least 10 times in a one-minute, 20-second video clip of the traffic stop incident which was posted on Facebook.I don’t see how you could help but be offended by the video. If not by the cop’s spewing of foul-language, then by the threats the officer made. It is unclear why the cops pulled over the young men, but one of the cops nuked out upon discovering the driver was using his phone to film them. One of the unidentified cops said, “Listen there’s two ways that this can go. Take that phone and stick it out of my face. I’m not gonna tell you again.”To read this article in full or to leave a comment, please click here

Watch Air Gordon dunk with an assist from Intel drone

Give Orlando Magic forward Aaron Gordon and Intel credit for creativity: The NBA player employed an AscTec Neo drone as part of his NBA Slam Dunk Contest repertoire. Intel Orlando Magic forward Aaron Gordon practices with Intel’s AscTec Neo drone ahead of the Slam Dunk Contest, as part of NBA All-Star 2017 festivities. Unfortunately, it took the athletic player 4 attempts to grab a pass from the roughly 11-pound hexicopter and complete the dunk, and he wound up getting knocked out of the competition early.To read this article in full or to leave a comment, please click here

Python – Kirk Byers Course Week 3 Part 2

This post will describe the exercises and solutions for week three of Kirk Byers Python for Network Engineers.

Exercise two of week three we already completed in a previous post where we used a For loop to loop through the BGP output.

Let’s move on to exercise three instead:

III. You have the following 'show ip int brief' output.
show_ip_int_brief = '''
Interface            IP-Address      OK?     Method      Status     Protocol
FastEthernet0   unassigned      YES     unset          up          up
FastEthernet1   unassigned      YES     unset          up          up
FastEthernet2   unassigned      YES     unset          down      down
FastEthernet3   unassigned      YES     unset          up          up
FastEthernet4    6.9.4.10          YES     NVRAM       up          up
NVI0                  6.9.4.10          YES     unset           up          up
Tunnel1            16.25.253.2     YES     NVRAM       up          down
Tunnel2            16.25.253.6     YES     NVRAM       up          down
Vlan1                unassigned      YES    NVRAM       down      down
Vlan10              10.220.88.1     YES     NVRAM       up          up
Vlan20              192.168.0.1     YES     NVRAM       down      down
Vlan100            10.220.84.1     YES     NVRAM       up          up
'''
From this output, create a list where each element in the list is a tuple consisting of (interface_name, ip_address, status, protocol).  Only include interfaces that are in the up/up state.
Print this list to standard output.

In this Continue reading

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Netool network port configuration analyzer – good concept, needs polish

When you get involved in the actual wiring of networks, one of the things you find yourself checking over and over is whether Ethernet ports are actually live along with do they connect to DHCP, is the Internet visible, and so on. Typically you’ll grab your laptop, plug it in and run a few tests but while this works, you might describe it as “sub-optimal” because how often have you tried to do exactly this in a ceiling void? In a cramped comms cupboard? Somewhere in the bowels of a rack? In every one of those situations it’s just time consuming and annoying to have to fiddle around and juggle with your laptop. The Netool network port analyzer aims to be a better tool for doing exactly this.To read this article in full or to leave a comment, please click here

Python – Kirk Byers Course Week 3 Part 1

This post will describe the exercises and solutions for week three of Kirk Byers Python for Network Engineers.

The first exercise of the week is the following:

I. Create an IP address converter (dotted decimal to binary).  This will be similar to what we did in class2 except:

    A. Make the IP address a command-line argument instead of prompting the user for it.
        ./binary_converter.py 10.88.17.23

    B. Simplify the script logic by using the flow-control statements that we learned in this class.

    C. Zero-pad the digits such that the binary output is always 8-binary digits long.  Strip off the leading '0b' characters.  For example,

        OLD:     0b1010
        NEW:    00001010

    D. Print to standard output using a dotted binary format.  For example,

        IP address          Binary
      10.88.17.23        00001010.01011000.00010001.00010111


    Note, you might need to use a 'while' loop and a 'break' statement for part C.
        while True:
            ...
            break       # on some condition (exit the while loop)

    Python will execute this loop again and again until the 'break' is encountered.

The first thing we want to do is to import the module sys because we are going to be working with command line arguments.

import sys

Continue reading

OpenSwitch Network Operating System

The Open Network Install Environment (ONIE) is an open source install environment that gives a switch user a choice to download ONIE compliant Network Operation System (NOS) to bare metal network switches. The OpenSwitch is community based, open source NOS that runs on hardware based on ONIE.

The goal of this article is to show how to build OpenSwitch Virtual Machine appliance, describe its capabilities and to introduce three methods for managing OpenSwitch. The OpenSwitch VM appliance was created by OpenSwitch project for training and testing purpose. It uses software data plane to forward the packets but it is not intended to be used as a virtual switch for connecting virtual machines. OpenSwitch supports many L2, L3 protocols such as STP, LACP, LLDP, OSPF, BGP, DHCP, TFTP, NTP, SSH, SNMP and others. These protocols run as separate daemons and they were integrated from another open-source projects.

For instance Quagga project provides L3 functionality to Openswitch. Quagga modules ops-ospf and ops-bgp update active routes in OpenvSwitch database (OVSDB). The module ops-zebra reads routes from OVSDB and install them to the kernel. Static routes are also stored in OVSDB, read by ops-zebra module and installed to the kernel. In order to use Continue reading

Users take the cheese to solve data breaches

Cheese Movers International’s restructuring resulted in some employees being unhappy with either their new role or the new management. And unhappy employees, especially those who know the system well and have access, can become major problems for companies.Verizon’s RISK Team was called in because the multinational company had heard rumblings among the disgruntled employees and found some negative comments online. While there was no evidence of a data breach, Cheese Movers' upper management was concerned something was coming.This is just one case found in Verizon’s recently released annual breach report, which examines some of the cases where the RISK Team was called in to hunt down culprits. The “ride–along edition” of Verizon’s report provides a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed, who defaced a website or where a leak is coming from. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here

Users take the cheese to solve data breaches

Cheese Movers International’s restructuring resulted in some employees being unhappy with either their new role or the new management. And unhappy employees, especially those who know the system well and have access, can become major problems for companies.Verizon’s RISK Team was called in because the multinational company had heard rumblings among the disgruntled employees and found some negative comments online. While there was no evidence of a data breach, Cheese Movers' upper management was concerned something was coming.This is just one case found in Verizon’s recently released annual breach report, which examines some of the cases where the RISK Team was called in to hunt down culprits. The “ride–along edition” of Verizon’s report provides a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed, who defaced a website or where a leak is coming from. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here

Ride along to solve these data breaches

Riding alongImage by Daimler AGVerizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed or where a leak is. With all the accounts, the names of the companies have been changed to protect the brand from public ridicule.To read this article in full or to leave a comment, please click here(Insider Story)

6 senators say U.S. firms are hiding their offshoring

Publicly traded companies are required by law to disclose only their global headcount, and that's all the information many of them provide. That keeps certain information a secret. These companies may be shrinking their U.S. headcount as they grow their overseas workforces. Six U.S. senators want to change that.These senators -- all Democrats -- are co-sponsoring legislation, introduced Thursday, that would require publicly traded companies to disclose their numbers of employees by location, by state, and by country."It's hard to hold companies accountable for gaming the system and shipping jobs overseas when it's not even known where their employees are located," said Sen. Gary Peters (D-Mich.), in a statement. One of the key reasons this bill, called the Outsourcing Accountability Act, was introduced is because it is difficult to find information about the number of jobs that are moved offshore.To read this article in full or to leave a comment, please click here

28% off Logitech G502 Proteus Spectrum RGB Tunable Gaming Mouse – Deal Alert

The G502 features the most advanced optical sensor for maximum tracking accuracy. Customize RGB lighting or sync it with other Logitech G products, set up custom profiles for your games, adjust sensitivity from 200 up to 12,000 DPI and position five 3.6g weights for just the right balance and feel. The G502 averages 4.5 out of 5 stars from over 1,000 people on Amazon, where its typical list price of $80 has been reduced to $58. See it now on Amazon.To read this article in full or to leave a comment, please click here

30% off Logitech G502 Proteus Spectrum RGB Tunable Gaming Mouse – Deal Alert

The G502 features the most advanced optical sensor for maximum tracking accuracy. Customize RGB lighting or sync it with other Logitech G products, set up custom profiles for your games, adjust sensitivity from 200 up to 12,000 DPI and position five 3.6g weights for just the right balance and feel. The G502 averages 4.5 out of 5 stars from over 1,000 people on Amazon, where its typical list price of $80 has been reduced to $56. See it now on Amazon.To read this article in full or to leave a comment, please click here