Archive

Category Archives for "Networking"

Security apps you need on your new Pixel

Google's new Pixel phoneImage by GoogleAll the brand new features of the Pixel will not protect it from increasingly frequent security threats: each user should take necessary precautions in order to protect their data, passwords or any sensitive online transactions. A new smartphone is also an attractive one-stop location for hackers who'd like to access personal bank account data, credit card passwords, name, address, social media accounts and so on.To read this article in full or to leave a comment, please click here

The 15 scariest games to play on Mac today

Frightening and funItching for some interactive thrills? We’ve got a nice stack of Halloween-ready options that you can download on your Mac today. If you’re looking for gruesome, violent adventures filled with aggressive enemies, we’ve got those. Prefer something atmospheric and eerie, albeit with the occasional well-timed jump-scare? Well, we definitely have those covered, too.To read this article in full or to leave a comment, please click here

7 technologies killed in Apple’s new MacBook Pro

Apple’s never been shy about shaving off features in its quest for slimmer, faster computing. The new MacBook Pro lineup is no exception.Following in the footsteps of the radical 12-inch MacBook, the revamped MacBook Pro and its slick Touch Bar cull several old standbys from its design—and kill one of its siblings in the process. Here are seven technologies eradicated in the new MacBook Pro notebooks. For more details on whether we think the eliminations are worthwhile, check out Macworld’s MacBook Pro hands-on impressions.To read this article in full or to leave a comment, please click here

12 Touch Bar controls we can’t wait to try on the new MacBook Pro

Touch and go, in a good wayApple has finally revealed the next-generation MacBook Pro, giving its notebook line a much-needed refresh. Its biggest change is the Touch Bar, a contextual row at the top of the keyboard that changes depending on which software you’re using, replacing your traditional row of function keys. It’s the first time Apple has built a Mac with touchscreen capabilities, and it’s one of the most elaborate Mac features we’ve ever seen.To read this article in full or to leave a comment, please click here

How to bring back a physical Escape key on the new MacBook Pro with Touch Bar

Apple showcased its new MacBook Pro on Thursday and demonstrated the new Touch Bar, an OLED touchbar across the top of the keyboard that replaces the function keys. The Touch Bar can be customized to suit the app that your Mac is currently running. The problem is that you may not have instant access to one of the most important keys on your Mac: The Escape (esc) key.The esc key isn't completely gone. If the Touch Bar is in another mode, you can hold down the fn key on the lower left of the keyboard. That will make the function keys appear on the Touch Bar, and that includes an esc key.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How the government can help businesses fight cyber attacks

When a criminal robs a store, the police visit the scene, conduct an investigation and try to bring the perpetrator to justice. What happens when a criminal breaches that same store’s server and makes off with its customer’s credit-card numbers? I’d argue that the response to the physical crime would be much greater and effective than how the cyber crime would be handled, although cyber attacks have the potential to cause more damage than robberies.Blame cyber criminals, not nation-states, for attacks While nation-states are typically blamed for breaches, the culprits are usually cyber criminals who are using nation-state techniques and procedures. Companies likely claim infiltration by nation-state attackers because it provides them with some cover from lawsuits and preserves business deals and partnerships. (Yahoo is using this tactic with little success.) The reasoning could look like this: how could our organization protect itself from attackers who have the support and resources of a major government? We’re simply outgunned.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How the government can help businesses fight cyber attacks

When a criminal robs a store, the police visit the scene, conduct an investigation and try to bring the perpetrator to justice. What happens when a criminal breaches that same store’s server and makes off with its customer’s credit-card numbers? I’d argue that the response to the physical crime would be much greater and effective than how the cyber crime would be handled, although cyber attacks have the potential to cause more damage than robberies.Blame cyber criminals, not nation-states, for attacks While nation-states are typically blamed for breaches, the culprits are usually cyber criminals who are using nation-state techniques and procedures. Companies likely claim infiltration by nation-state attackers because it provides them with some cover from lawsuits and preserves business deals and partnerships. (Yahoo is using this tactic with little success.) The reasoning could look like this: how could our organization protect itself from attackers who have the support and resources of a major government? We’re simply outgunned.To read this article in full or to leave a comment, please click here

Last Three days for the 10 days Online CCDE Practical Bootcamp

Last three days for the November 10 days Online CCDE Bootcamp ! By November 1, I am going to start my NEW CCDE Practical Lab Training. There are couple things to highlight. Online Bootcamp is Instructor-Led Bootcamp. I will be in the class and explain everything you need to pass the CCDE Practical exam. Instructor Led doesn’t […]

The post Last Three days for the 10 days Online CCDE Practical Bootcamp appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

IDG Contributor Network: How much does a data breach actually cost?

The American public has become so inured to data breaches that it’s difficult to remember them all. Infamous breaches like the ones at Target and Sony become almost forgettable when confronted with the recently disclosed half-billion accounts compromised at Yahoo in 2014.The numbers are simply staggering. It is estimated over 900,000,000 records of personally identifiable information (PII) have been stolen in the U.S. over the past few years. Keeping a memory of all the hacks and when they happened may require the use of complex data visualization.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How much does a data breach actually cost?

The American public has become so inured to data breaches that it’s difficult to remember them all. Infamous breaches like the ones at Target and Sony become almost forgettable when confronted with the recently disclosed half-billion accounts compromised at Yahoo in 2014.The numbers are simply staggering. It is estimated over 900,000,000 records of personally identifiable information (PII) have been stolen in the U.S. over the past few years. Keeping a memory of all the hacks and when they happened may require the use of complex data visualization.To read this article in full or to leave a comment, please click here

Pennsylvania man sentenced to 18 months for celeb hacking

A Pennsylvania man was sentenced to 18 months in federal prison on charges of hacking the Google and Apple email accounts of over 100 people including celebrities, and getting access to nude videos and photographs of some people.The sentencing against Ryan Collins, 36, of Lancaster is the offshoot of a Department of Justice investigation into the online leaks of photographs of numerous female celebrities in September 2014, widely referred to as "Celebgate."But DOJ has not found any evidence linking Collins to the actual leaks or the sharing and uploading of the content.Between November 2012 and early September 2014, Collins is said to have sent e-mails to victims that appeared to be from Apple or Google and asked them to provide their usernames and passwords. Having gained access to the email accounts, he got hold of personal information including nude photographs and videos, and in some cases used a software program to download the entire contents of the victims' Apple iCloud backups, according to DOJ.To read this article in full or to leave a comment, please click here

Pennsylvania man sentenced to 18 months for celeb hacking

A Pennsylvania man was sentenced to 18 months in federal prison on charges of hacking the Google and Apple email accounts of over 100 people including celebrities, and getting access to nude videos and photographs of some people.The sentencing against Ryan Collins, 36, of Lancaster is the offshoot of a Department of Justice investigation into the online leaks of photographs of numerous female celebrities in September 2014, widely referred to as "Celebgate."But DOJ has not found any evidence linking Collins to the actual leaks or the sharing and uploading of the content.Between November 2012 and early September 2014, Collins is said to have sent e-mails to victims that appeared to be from Apple or Google and asked them to provide their usernames and passwords. Having gained access to the email accounts, he got hold of personal information including nude photographs and videos, and in some cases used a software program to download the entire contents of the victims' Apple iCloud backups, according to DOJ.To read this article in full or to leave a comment, please click here

NAPALM Update on Software Gone Wild

We did a podcast describing NAPALM, an open-source multi-vendor abstraction library, a while ago, and as the project made significant progress in the meantime, it was time for a short update.

NAPALM started as a library that abstracted the intricacies of network device configuration management. Initially it supported configuration replace and merge; in the meantime, they added support for diffs and rollbacks

Read more ...

Personal data of 550,000 Red Cross blood donors was breached

The Australian Red Cross said its blood donor service has found that registration information of 550,000 donors had been compromised, which the agency blamed on human error by a third-party contractor.The moot issue at this point, which may decide how the breach unfolds, is that nobody knows how many people have the data. The information from 2010 to 2016 was available on the website from Sept. 5 to Oct. 25. this year.The database backup, consisting of 1.74GB with about 1.3 million records, contains information about blood donors, such as name, gender, physical address, email address, phone number, date of birth, blood type, country of birth, and previous donations, according to security researcher Troy Hunt.To read this article in full or to leave a comment, please click here

Personal data of 550,000 Red Cross blood donors was breached

The Australian Red Cross said its blood donor service has found that registration information of 550,000 donors had been compromised, which the agency blamed on human error by a third-party contractor.The moot issue at this point, which may decide how the breach unfolds, is that nobody knows how many people have the data. The information from 2010 to 2016 was available on the website from Sept. 5 to Oct. 25. this year.The database backup, consisting of 1.74GB with about 1.3 million records, contains information about blood donors, such as name, gender, physical address, email address, phone number, date of birth, blood type, country of birth, and previous donations, according to security researcher Troy Hunt.To read this article in full or to leave a comment, please click here