Archive

Category Archives for "Networking"

New OS X Tools for Photographers

If you’re into photography you’ll probably have tried all sorts of software tools in the quest for the perfect image. Over the years my favorite apps for managing, tweaking, and massaging images have been Adobe Lightroom and, when I want very specific results, Adobe Photoshop. The problem that I have had with Photoshop, in common with many other people, is that getting really good at correcting problems takes a lot of time and experience; Photoshop is not only complex but its features are so remarkably broad that photo editing becomes death by choices.Recently I’ve come across some software titles for OS X (macOS … whatever) that makes much of the power of Photoshop available in what you might consider pre-packaged forms for very reasonable prices. And, as we will see, some of the apps also operate as Photoshop plug-ins making serious photo editing easier.  To read this article in full or to leave a comment, please click here

Leaving it to the Last Second

Thanks to the moon, the earth's rate of rotation is slowing down. To compensate, we periodically adjust Universal Coordinated Time. On Saturday 31st December 2016, the last minute of 2016 will be extended to be 61 seconds long, creating the the timestamp 24:59:60. Previous leap seconds have not gone completely smoothly, and there is no particular reason to think that much will have changed for this leap second.

Non-malware attacks are on the rise

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black.Attacks that exploited applications and processes legitimately running on systems – non-malware incidents – have risen from representing about 3% of all attacks in January to about 13% in November, the company’s “Non-malware attacks and ransomware take center stage in 2016” report says.“Non-malware attacks are at the highest levels we have seen and should be a major focus for security defenders during the coming year,” it says.The research included data from more than 1,000 Carbon Black customers that represent 2.5 million-plus endpoints. For measuring the non-malware attacks, the authors considered the malicious use of PowerShell and Windows Management Instrumentation were considered.To read this article in full or to leave a comment, please click here

Non-malware attacks are on the rise

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black.Attacks that exploited applications and processes legitimately running on systems – non-malware incidents – have risen from representing about 3% of all attacks in January to about 13% in November, the company’s “Non-malware attacks and ransomware take center stage in 2016” report says.“Non-malware attacks are at the highest levels we have seen and should be a major focus for security defenders during the coming year,” it says.The research included data from more than 1,000 Carbon Black customers that represent 2.5 million-plus endpoints. For measuring the non-malware attacks, the authors considered the malicious use of PowerShell and Windows Management Instrumentation were considered.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Five ways cybersecurity is nothing like the way Hollywood portrays it

According to pop culture’s portrayal of cybersecurity, the industry is hot property. Hacks and breaches not only dominate the real-world media, but they can be seen everywhere in TV and movies today.Granted, there have been some early examples of security issues playing a role in pop culture plot lines, such as the 1980s cult-classic Tron. But in recent years, Hollywood seems to have really picked up the mantle when it comes to cybersecurity. If the bright lights of TV and movies are to be believed, hackers are simultaneously the coolest and scariest people on the planet.Let’s take a look at five of the most common cybersecurity misperceptions as portrayed in TV shows and movies:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Five ways cybersecurity is nothing like the way Hollywood portrays it

According to pop culture’s portrayal of cybersecurity, the industry is hot property. Hacks and breaches not only dominate the real-world media, but they can be seen everywhere in TV and movies today.Granted, there have been some early examples of security issues playing a role in pop culture plot lines, such as the 1980s cult-classic Tron. But in recent years, Hollywood seems to have really picked up the mantle when it comes to cybersecurity. If the bright lights of TV and movies are to be believed, hackers are simultaneously the coolest and scariest people on the planet.Let’s take a look at five of the most common cybersecurity misperceptions as portrayed in TV shows and movies:To read this article in full or to leave a comment, please click here

Ransomware fighting coalition adds new members and decryption tools

The No More Ransom project, a coalition of law enforcement and security companies, has expanded with 30 new members and added 32 new decryption tools for various ransomware variants.The project, which consists of a website dedicated to fighting ransomware, was originally launched by Europol’s European Cybercrime Centre in partnership with the National High Tech Crime Unit of the Netherlands police, Kaspersky Lab, and Intel Security.The website has a tool that allows users to determine which type of ransomware has affected their files but also contains general information about ransomware, prevention advice, and instruction on reporting incidents to law enforcement.To read this article in full or to leave a comment, please click here

Ransomware fighting coalition adds new members and decryption tools

The No More Ransom project, a coalition of law enforcement and security companies, has expanded with 30 new members and added 32 new decryption tools for various ransomware variants.The project, which consists of a website dedicated to fighting ransomware, was originally launched by Europol’s European Cybercrime Centre in partnership with the National High Tech Crime Unit of the Netherlands police, Kaspersky Lab, and Intel Security.The website has a tool that allows users to determine which type of ransomware has affected their files but also contains general information about ransomware, prevention advice, and instruction on reporting incidents to law enforcement.To read this article in full or to leave a comment, please click here

Monitoring Linux services

Mainstream Linux distributions have moved to systemd to manage daemons (e.g. httpd, sshd, etc.). The diagram illustrates how systemd runs each daemon within its own container so that it can maintain tight control of the daemon's resources.

This article describes how to use the open source Host sFlow agent to gather telemetry from daemons running under systemd.

Host sFlow systemd monitoring exports a standard set of metrics for each systemd service - the sFlow Host Structures extension defines metrics for Virtual Nodes (virtual machines, containers, etc.) that are used to export Xen, KVM, Docker, and Java resource usage. Exporting the standard metrics for systemd services provides interoperability with sFlow analyzers, allowing them to report on Linux services using existing virtual node monitoring capabilities.

While running daemons within containers helps systemd maintain control of the resources, it also provides a very useful abstraction for monitoring. For example, a single service (like the Apache web server) may consist of dozens of processes. Reporting on container level metrics abstracts away the per-process details and gives a view of the total resources consumed by the service. In addition, service metadata (like the service name) provides a useful way of identifying and grouping Continue reading

Help light an IPv6-enabled Christmas tree

Posted to Reddit’s section devoted to networking by user felixdgniezno, this IPv6-enabled Christmas tree is garnering rave reviews from the kinds of people who read Reddit’s section devoted to networking and are amused by the notion of an IPv6-enabled Christmas tree.From the instructions found on the hosting site, which is located in Belgium, not surprisingly (I’ll explain why below): Ping it to light it up! 2001:6a8:28c0:2017::AA:BB:CC for HTML Color #AABBCC 2001:6a8:28c0:2017::FF:00:00 for color RED 2001:6a8:28c0:2017::00:FF:00 for color GREEN 2001:6a8:28c0:2017::00:00:FF for color BLUE 2001:6a8:28c0:2017::FF:FF:FF for color WHITE ... and so on...To read this article in full or to leave a comment, please click here

Help light an IPv6-enabled Christmas tree

Posted to Reddit’s section devoted to networking by user felixdgniezno, this IPv6-enabled Christmas tree is garnering rave reviews from the kinds of people who read Reddit’s section devoted to networking and are amused by the notion of an IPv6-enabled Christmas tree.From the instructions found on the hosting site, which is located in Belgium, not surprisingly (I’ll explain why below): Ping it to light it up! 2001:6a8:28c0:2017::AA:BB:CC for HTML Color #AABBCC 2001:6a8:28c0:2017::FF:00:00 for color RED 2001:6a8:28c0:2017::00:FF:00 for color GREEN 2001:6a8:28c0:2017::00:00:FF for color BLUE 2001:6a8:28c0:2017::FF:FF:FF for color WHITE ... and so on...To read this article in full or to leave a comment, please click here

Feds frustrated by constantly crashing apps

Imagine if Twitter was offline for an entire day. Sure, some might be happy for the break, but the uproar that would greet a day with no access to the internet's public square would no doubt be loud and angry.Within the federal government, however, seeing collaboration, communication and database applications go offline for a day or longer is commonplace, a new survey has found.[ Related: Not dead yet: 7 of the oldest federal IT systems still wheezing away ]To read this article in full or to leave a comment, please click here

Despite risk, 1,000 in tech pledge not to help Trump’s data efforts

As President-elect Donald Trump met with high-tech business leaders in New York on Wednesday, some of their employees were affirming, in tweets, a decision to join the resistance.The Neveragain.tech pledge passed more than 1,000 signatures, it announced late Wednesday, hours after Trump had wrapped up his meeting with a dozen tech executives. Participating in the pledge means agreeing not to help the government create a database that can be used to target people based on race or religion or "facilitate mass deportations."[To comment on this article, visit Computerworld's Facebook page.]To read this article in full or to leave a comment, please click here

FCC Chairman Wheeler to step down in January

U.S. Federal Communications Commission Chairman Tom Wheeler will step down on Jan. 20, clearing the way for President-elect Donald Trump to appoint a Republican chairman and majority at the agency.Wheeler, a Democrat appointed chairman by President Barack Obama in late 2013, was the architect of the FCC's strong net neutrality regulations, approved by the FCC in February 2015. Ajit Pai, a Republican commissioner who's mentioned as a possible successor to Wheeler, has vowed to repeal the net neutrality rules and to take a "weed wacker" to other FCC regulations.To read this article in full or to leave a comment, please click here

FCC Chairman Wheeler to step down in January

U.S. Federal Communications Commission Chairman Tom Wheeler will step down on Jan. 20, clearing the way for President-elect Donald Trump to appoint a Republican chairman and majority at the agency.Wheeler, a Democrat appointed chairman by President Barack Obama in late 2013, was the architect of the FCC's strong net neutrality regulations, approved by the FCC in February 2015. Ajit Pai, a Republican commissioner who's mentioned as a possible successor to Wheeler, has vowed to repeal the net neutrality rules and to take a "weed wacker" to other FCC regulations.To read this article in full or to leave a comment, please click here