Archive

Category Archives for "Networking"

13% off AmazonBasics High Security 17-Sheet Micro-Cut Paper, CD, and Credit Card Shredder – Deal Alert

This powerful shredder from AmazonBasics micro-cuts a letter-sized sheet of paper into 2,235 useless pieces of confetti, up to 17 sheets at a time. Inserted one at a time into the designated slot, it also destroys credit cards, CDs, DVDs, and Blu Rays, rendering them completely unusable. It features a generous 7-gallon bin that pulls out for easy disposal. This micro-cut shredder averages 4.5 out of 5 stars on Amazon from over 170 people (82% rate a full 5 stars: read reviews). Its typical list price of $165 has been reduced 13% to $144.To read this article in full or to leave a comment, please click here

GitLab deleted then restored list of online stores infected with skimming software

For at least six months, the online store at the National Republican Senatorial Committee site had “hidden skimming software” in the form of malicious JavaScript code; it was far from the only store which hackers had compromised via exploiting vulnerabilities in unpatched versions of ecommerce platforms, such as Magento. In fact, at least 5,925 stores were unwittingly participating in online skimming attacks run by multiple cybercriminal groups. Dutch researcher Willem de Groot estimated that 85 stores are compromised daily.To read this article in full or to leave a comment, please click here

GitLab deleted, then restored, list of online stores infected with skimming software

For at least six months, the online store at the National Republican Senatorial Committee site had “hidden skimming software” in the form of malicious JavaScript code. It was far from the only store hackers had compromised via exploiting vulnerabilities in unpatched versions of ecommerce platforms, such as Magento. In fact, at least 5,925 stores were unwittingly participating in online skimming attacks run by multiple cybercriminal groups. Dutch researcher Willem de Groot estimated that 85 stores are compromised daily.To read this article in full or to leave a comment, please click here

GitLab deleted then restored list of online stores infected with skimming software

For at least six months, the online store at the National Republican Senatorial Committee site had “hidden skimming software” in the form of malicious JavaScript code; it was far from the only store which hackers had compromised via exploiting vulnerabilities in unpatched versions of ecommerce platforms, such as Magento. In fact, at least 5,925 stores were unwittingly participating in online skimming attacks run by multiple cybercriminal groups. Dutch researcher Willem de Groot estimated that 85 stores are compromised daily.To read this article in full or to leave a comment, please click here

GitLab deleted, then restored, list of online stores infected with skimming software

For at least six months, the online store at the National Republican Senatorial Committee site had “hidden skimming software” in the form of malicious JavaScript code. It was far from the only store hackers had compromised via exploiting vulnerabilities in unpatched versions of ecommerce platforms, such as Magento. In fact, at least 5,925 stores were unwittingly participating in online skimming attacks run by multiple cybercriminal groups. Dutch researcher Willem de Groot estimated that 85 stores are compromised daily.To read this article in full or to leave a comment, please click here

Big Black Friday prize: Virtual reality gaming systems?

A fresh infusion of virtual reality gaming systems such as Sony PlayStation VR could make these hot Black Friday 2016 shopping items, but don't expect to get off too easy on prices. Sony this month just started selling PlayStation VR, which starts at $400 just for the headset, so figure on $500 if you want the bundle of headset/camera/controllers (and you'll need a PlayStation console too). Then you're going to need some games as well. PlayStation VR joins the Oculus Rift and HTC VIVE, both of which became available earlier this year, going beyond the less elaborate VR viewers such as Google Cardboard and Samsung Gear VR.To read this article in full or to leave a comment, please click here

One of the better explanations of SDN

Stumbled upon this via HighScalability:

Every time I feel like I'm "out of touch" with the hip new thing, I take a weekend to look into it. I tend to discover that the core principles are the same [...]; or you can tell they didn't learn from the previous solution and this new one misses the mark, but it'll be three years before anyone notices (because those with experience probably aren't touching it yet, and those without experience will discover the shortcomings in time.)

Yep, that explains the whole centralized control plane ruckus ;) Read also a similar musing by Ethan Banks.

ManagedMethods brings shadow IT and shadow data into the light

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  At the recent Gartner Security & Risk Management Summit, Gartner VP Neil MacDonald spoke about the technology trends for 2016 that provide the most effective business support and risk management. Cloud Access Security Brokers (CASBs) are number one on the list. According to Gartner, companies' use of Software as a Service (SaaS) applications create new challenges to security teams due to limited visibility and control options. CASBs enable businesses to apply much-needed security policies across multiple cloud services.To read this article in full or to leave a comment, please click here

Best Deals of the Week, October 10th – October 14th – Deal Alert

Best Deals of the Week, October 10th - October 14th - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 10th. All items are highly rated, and dramatically discounted.27% off SanDisk Connect Wireless Stick 200GBThe SanDisk Connect wireless stick is a flash drive with a unique twist -- you can access it wirelessly. Whether it's in your pants pocket, in your bag, or on the picnic table at your campsite, the Connect wireless stick lets you stream media or move files wirelessly with up to three computers, phones or tablets simultaneously. Connections are made via built-in wifi (think "hotspot"), so no external wireless or internet services are needed. A USB connection is also available, if desired. Storage on this model is a generous 200GB. Reviewers on Amazon report at least 8-10 hours of battery life on one charge. This model is currently discounted 27%, from $119.99 down to $87.56. See it now on Amazon.To read this article in full or to leave a comment, please click here

Blade Chassis to End of Row Swithces Connectivity & High Availability Options

Spanning Tree Protocol (STP) free network inside Data Centre is main focus for network vendors and many technologies have been introduced in recent past to resolve STP issues in data centre and ensure optimal link utilization. Advent of switching modules inside blade enclosures coupled with the requirements for optimal link utilization starting right from blade server has made today’s Data Centre network more complex.

In this blog , we will discuss how traditional model of network switches placement (End of Row) can be coupled with blade chassis with different options available for end to end connectivity / high availability.

Network Switches are placed in End of Row and in order to remove STP Multi-Chassis Link Aggregation (MC-LAG) is deployed. Please see one of my earlier blog for understanding of MC-LAG.

Option 1: Rack mounted servers for computing machines, servers have installed multiple NICs in Pass-Though module and Virtual Machines hosted inside servers require Active/Active NIC Teaming.

picture5

Option 2 : Blade Chassis has multiple blade servers and each blade servers has more than 1 NIC (which are connected with blade chassis switches through internal fabric link). Virtul Machines hosted inside blade servers require active/active NIC teaming.

picture6

Option 3 : Blade Chassis Continue reading

Secret Service IT security lambasted by Homeland Security inspector general

For now, the US Secret Service has no reasonable assurance that its information systems are properly secured to protect Law Enforcement Sensitive case management information.That was but one of the conclusions laid at the feet of the US Secret Service today by the Department of Homeland Security’s Inspector General, John Roth in a scathing report on the agency tasked with protecting the President and other important government officials.+More on Network World: Federal cyber incidents grew an astounding 1,300% between 2006 and 2015+To read this article in full or to leave a comment, please click here

Secret Service IT security lambasted by Homeland Security inspector general

For now, the US Secret Service has no reasonable assurance that its information systems are properly secured to protect Law Enforcement Sensitive case management information.That was but one of the conclusions laid at the feet of the US Secret Service today by the Department of Homeland Security’s Inspector General, John Roth in a scathing report on the agency tasked with protecting the President and other important government officials.+More on Network World: Federal cyber incidents grew an astounding 1,300% between 2006 and 2015+To read this article in full or to leave a comment, please click here

Secret Service IT security lambasted by Homeland Security inspector general

For now, the US Secret Service has no reasonable assurance that its information systems are properly secured to protect Law Enforcement Sensitive case management information.That was but one of the conclusions laid at the feet of the US Secret Service today by the Department of Homeland Security’s Inspector General, John Roth in a scathing report on the agency tasked with protecting the President and other important government officials.+More on Network World: Federal cyber incidents grew an astounding 1,300% between 2006 and 2015+To read this article in full or to leave a comment, please click here

Really, CNN? Trump and Obama?

My brother has the CNN app on his iPhone and tells me the network just sent him this bit of rather startling news: Uh … one can assume the twins starting a new life are the formerly conjoined Anias and Jadon McDonald.And Obama was addressing his rebuff to Trump.To read this article in full or to leave a comment, please click here

Sony’s $399 PlayStation VR headset rolls out October 13, backed by dozens of games

After months of slowly rolling out information, Sony has finally announced the final crucial details you need to know about the PlayStation VR. Sony’s new VR headset will roll out on October 13 and there will be 50 VR-friendly games released for the PlayStation VR in 2016. Sony announced pricing back in March and reiterated it during E3. The headset as a stand-alone device costs $399, but to actually use it you also need a PlayStation Camera ($40-$60) and a set of PlayStation Move controllers ($25) bringing the real price closer to $500. You’ll also need a PlayStation 4 console, naturally.To read this article in full or to leave a comment, please click here

The time travel paradox of artificial intelligence

Kurt Vonnegut’s novel Slaughterhouse Five and J.K.Rowling’s series of Harry Potter novels describe the time travel paradox. Traveling through time changes the future from the point in time where the traveler arrived. The personal assistant that will arrive at some time in the future will change humans from that point in time forward, but in a more impactful way than GPS.Artificially intelligent personal assistants will be part of our lives Google and Facebook have recruited the best artificial intelligence (AI) and machine learning talent in the world to build personal assistants in small increments.To read this article in full or to leave a comment, please click here