Archive

Category Archives for "Networking"

Best Deals of the Week, October 31st – November 4th – Deal Alert

Best Deals of the Week, October 31st - November 4thCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted.43% off NETGEAR AC750 WiFi Range ExtenderBoost the range of your existing WiFi and create a stronger signal in hard-to-reach areas with a WiFi range extender like this one from Netgear, which is highly rated and currently discounted 43% on Amazon. . This compact AC750 wall-plug WiFi booster delivers AC dual band WiFi up to 750 Mbps, and is small and discreet, easily blending into your home decor. Well over 13,000 people have reviewed the AC750 on Amazon (read reviews) and have given it an average of 4 out of 5 stars. Right now its list price of $70 has been reduced to $40. See it now on Amazon.To read this article in full or to leave a comment, please click here

Best Deals of the Week, October 31st – November 4th – Deal Alert

Best Deals of the Week, October 31st - November 4thCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted.43% off NETGEAR AC750 WiFi Range ExtenderBoost the range of your existing WiFi and create a stronger signal in hard-to-reach areas with a WiFi range extender like this one from Netgear, which is highly rated and currently discounted 43% on Amazon. . This compact AC750 wall-plug WiFi booster delivers AC dual band WiFi up to 750 Mbps, and is small and discreet, easily blending into your home decor. Well over 13,000 people have reviewed the AC750 on Amazon (read reviews) and have given it an average of 4 out of 5 stars. Right now its list price of $70 has been reduced to $40. See it now on Amazon.To read this article in full or to leave a comment, please click here

BGP Tools for the DFZ (1)

Why isn’t inbound load balancing working the way I expect? Why are users having a hard time reaching my web site? What is that strange advertisement I see in my local routing table, and where does it lead? The Default Free Zone (DFZ), the land where there is no default route from the edge of the Internet to the core, can seem like an intimidating place to work. There are, however, a number of tools that can help you discover what is going on with your routes, where routes are coming from, and other information. This short series of posts will provide an overview of these tools, and some use cases along the way to help you understand how and where to use them.

Note: throughout this series, I’m going to be using the LinkedIn AS number and routes, as well as the AS numbers of other public companies for illustration. I’m deviating from my normal practice of using addresses and AS numbers reserved for documentation in order to make it possible for readers to perform the same actions and get something like the same results. Do not use these addresses or AS numbers in your network!

Let’s start by Continue reading

How to reduce Windows 10’s on-disk footprint

While certain areas of the Windows file structure may be off-limits to direct action — most notably, deleting files inside the C:\Windows (or %windir%) folder — that doesn’t mean that savvy Windows admins and power users can’t selectively prune excess or obsolete files. You just need the right tools.To read this article in full or to leave a comment, please click here(Insider Story)

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Cybersecurity experts stress it would be incredibly difficult to hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Cybersecurity experts stress it would be incredibly difficult to hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here

No, Apple and Microsoft aren’t trading places

For the past couple of weeks, the interwebs have been buzzing with talk that Microsoft and Apple have somehow switched positions in the tech world. The formerly staid folks in Redmond, so the theory goes, are now the cool technology innovators, while the once audacious corps in Cupertino has been reduced to milking existing cash cows.The idea got rolling in reaction to a provocative post by legendary entrepreneur Steve Blank, who compared Tim Cook’s regime as Apple’s designated caretaker following Steve Jobs to the long, slow decline at Microsoft under Steve Ballmer, Bill Gate’s designated replacement. And the meme took off with the dueling announcements of Microsoft’s slick new Surface Studio computer and Apple’s underwhelming update of its Macbook Pro laptop. To read this article in full or to leave a comment, please click here

Hackers can abuse LTE protocols to knock phones off networks

When you travel between countries, the mobile operators that temporarily provide service to your phone need to communicate with your operator back home. This is done over a global interconnection network where most traffic still uses an ageing protocol, called SS7, that's known to be vulnerable to location tracking, eavesdropping, fraud, denial of service (DoS), SMS interception and other attacks.With the advance of Long-Term Evolution (LTE) networks, some roaming traffic is switching to a newer protocol, called Diameter, that's more secure than SS7 in theory, but which still allows for attacks if it's not deployed with additional security mechanisms.To read this article in full or to leave a comment, please click here

Hackers can abuse LTE protocols to knock phones off networks

When you travel between countries, the mobile operators that temporarily provide service to your phone need to communicate with your operator back home. This is done over a global interconnection network where most traffic still uses an ageing protocol, called SS7, that's known to be vulnerable to location tracking, eavesdropping, fraud, denial of service (DoS), SMS interception and other attacks.With the advance of Long-Term Evolution (LTE) networks, some roaming traffic is switching to a newer protocol, called Diameter, that's more secure than SS7 in theory, but which still allows for attacks if it's not deployed with additional security mechanisms.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What’s with application monitoring? Another company picks up a monster funding round

An interesting thing is going on in the application and infrastructure monitoring space. A ton of money is being poured into the various vendors in the market, and all of those vendors are rapidly morphing their platforms to provide holistic monitoring functionality. No longer is it just about application monitoring or infrastructure monitoring in isolation. What is de rigueur today is combined monitoring that provides the often-talked about “single pane of glass” across all of an organizations assets.+ Also on Network World: Infrastructure monitoring products: Users pinpoint the best and worst features + It’s a fairly busy space—New Relic, DataDog, AppDynamics and a host of others compete. And to that list we must add Wavefront, a Silicon Valley company that recently scored an impressive $52 million by way of a Series B funding round. The company advises that their valuation increased four times compared to their Series A round—no down valuations for this player. It also scored top-shelf investors, existing investors Sequoia Capital and Sutter Hill Ventures were joined by new investor Tenaya Capital and other equity holders.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Tesco Bank breach causes 20,000 customers to lose money

The fine details are still murky, but news surfaced in the last day or two that Tesco Bank, a U.K.-based bank owned by the Tesco supermarket chain, suffered some sort of widespread fraud. The bank’s CEO, Benny Higgins, told Radio 4 that around 40,000 of the bank’s 7 million accounts had seen “some sort of suspicious transactions.” Of those, around 20,000 customers have actually lost money from their bank accounts. In the interview, the CEO told the BBC he was “very hopeful” that customers would be refunded the lost funds. What he didn’t say is that I am sure he is also “very hopeful” that once this all washes up he and his IT team will still have jobs.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Tesco Bank breach causes 20,000 customers to lose money

The fine details are still murky, but news surfaced in the last day or two that Tesco Bank, a U.K.-based bank owned by the Tesco supermarket chain, suffered some sort of widespread fraud. The bank’s CEO, Benny Higgins, told Radio 4 that around 40,000 of the bank’s 7 million accounts had seen “some sort of suspicious transactions.” Of those, around 20,000 customers have actually lost money from their bank accounts. In the interview, the CEO told the BBC he was “very hopeful” that customers would be refunded the lost funds. What he didn’t say is that I am sure he is also “very hopeful” that once this all washes up he and his IT team will still have jobs.To read this article in full or to leave a comment, please click here

New app for HoloLens targets architects

Architects have a new reason to pick up Microsoft's HoloLens, after the launch of an app aimed at helping them explore 3D models of buildings.Trimble launched its SketchUp Viewer app for Microsoft's headset on Monday, which will allow people to use the HoloLens's augmented reality capabilities for viewing models created in SketchUp. The app will have two modes: one that allows people to view a scaled-down version of the model using the HoloLens, and another that allows them to view what a building modeled in SketchUp would look like from the inside.Deploying a HoloLens with SketchUp Viewer will cost businesses a pretty penny. The app costs US$1,500, on top of the HoloLens's whopping $3,000 price tag. Still, it's a new and different way for people to visualize models in a way they couldn't before.To read this article in full or to leave a comment, please click here

SNL for some reason spoofs 1984 Apple Macintosh ad in 2016

SNL over the weekend took advantage of super cool guest host Benedict Cumberbatch to star in a spoof ad about the next great toilet that's based on Apple's famous 1984 Macintosh computer commercial.Why exactly SNL decided to reach back for this classic commercial as inspiration for fresh fun poking at Apple isn't clear, but maybe Apple's latest drawn-out product introduction (MacBook Pros) put someone there over the edge. See the original ad and the SNL spoof below.MORE: Most memorable SNL tech skits and bitsTo read this article in full or to leave a comment, please click here

Microsoft adds Kubernetes support to Azure Container Service

Containers have become a major fixture of modern application development. Companies are turning to the technology because it helps them more easily create portable, scalable applications that can work in a wide variety of environments, including the public cloud.Microsoft is aiming to further capitalize on that trend with a set of updates announced Monday for its public cloud platform.Azure Container Service, Microsoft’s cloud-optimized container-hosting offering, now supports orchestration using the Kubernetes open-source platform. On top of that, Microsoft has upgraded the service to use DC/OS 1.8.4, which brings improvements like built-in job scheduling.To read this article in full or to leave a comment, please click here

Nyansa brings a new approach to end-user management

Legacy network and application management tools are significantly underpowered for today’s digital organizations. These old-school tools operate with a “bottoms-up” view of the IT environment, with each element having its own management tool.Gathering insights from these discrete platforms is very difficult, as it requires a tremendous amount of manual data collection, aggregation and analytics. If Spock happened to be the lead engineer, this might be fine, but assuming no one in the IT department went to the Vulcan Science Academy, it’s likely that most organizations struggle with this model.The big weakness of bottoms-up management is that it gives no real view of the end-user experience. It might be helpful in understanding if a certain element is down, but there’s no way to correlate that to the actual performance of an application, which is what the user is seeing.To read this article in full or to leave a comment, please click here

Security vendor demonstrates hack of US e-voting machine

A hacker armed with a US$25 PCMCIA card can, within a few minutes, change the vote totals on an aging electronic voting machine that is now in limited use in 13 U.S. states, a cybersecurity vendor has demonstrated.The hack by security vendor Cylance, which released a video of it Friday, caught the attention of noted National Security Agency leaker Edward Snowden, but other critics of e-voting security dismissed the vulnerability as nothing new.The Cylance hack demonstrated a theoretical vulnerability described in research going back a decade, the company noted.To read this article in full or to leave a comment, please click here