Archive

Category Archives for "Networking"

Panda Banker’s Future DGA

Since we last visited the Panda Bankers at the malware zoo, two new versions have emerged: 2.2.6 and 2.2.7. While sifting through the encrypted strings of the latest version, two interesting ones stood out: dgaconfigs DGA, download “%S”. Tracing the first one through the code does indeed lead to a DGA or a domain generation […]

Data center management in the cloud can predict downtime, vendors say

Data center power management vendor Eaton’s newest product has sensors that that the company says will proactively warn customers of when equipment component failures are likely to occur.Eaton’s announcement today of PulseIngisht Analaytics is part of a broader trend in the data center infrastructure management (DCIM) market moving to cloud-based platforms, says 451 Research director for data center technologies Rhonda Ascierto. Vendors such as Eaton, Schneider Electric and Emerson Network Power are evolving their platforms to collect more data their power systems generate and analyze it to provide customers with detailed information about data center performance, and even help predict and prevent downtime from equipment failure.To read this article in full or to leave a comment, please click here

Data center management in the cloud can predict downtime, vendors say

Data center power management vendor Eaton’s newest product has sensors that that the company says will proactively warn customers of when equipment component failures are likely to occur.Eaton’s announcement today of PulseIngisht Analaytics is part of a broader trend in the data center infrastructure management (DCIM) market moving to cloud-based platforms, says 451 Research director for data center technologies Rhonda Ascierto. Vendors such as Eaton, Schneider Electric and Emerson Network Power are evolving their platforms to collect more data their power systems generate and analyze it to provide customers with detailed information about data center performance, and even help predict and prevent downtime from equipment failure.To read this article in full or to leave a comment, please click here

Waratek upgrades Java protection

Waratek is introducing a feature to its Java-protection platform that enables upgrading to the current version of Java without having to install Java updates or touch the apps running within the Java virtual machine.The latest version of its AppSecurity for Java uses secure virtual containers around the entire Java application stack to apply the security and performance features of the current Java 8 platform’s security and performance levels without having to install Java 8, the company says.The alternative would be to replace the Java Runtime Environment (JRE) and upgrade the application code directly. That would involve taking the application offline while the upgrades are performed.To read this article in full or to leave a comment, please click here

Waratek upgrades Java protection

Waratek is introducing a feature to its Java-protection platform that enables upgrading to the current version of Java without having to install Java updates or touch the apps running within the Java virtual machine.The latest version of its AppSecurity for Java uses secure virtual containers around the entire Java application stack to apply the security and performance features of the current Java 8 platform’s security and performance levels without having to install Java 8, the company says.The alternative would be to replace the Java Runtime Environment (JRE) and upgrade the application code directly. That would involve taking the application offline while the upgrades are performed.To read this article in full or to leave a comment, please click here

EU gets ready to fine Google in Android antitrust suit

The European Commission is preparing to fine Google for paying smartphone makers to exclusively use its search engine on their mobile devices, according to Reuters.The European Union's antitrust authority filed a so-called statement of objections against Google in April, accusing it of forcing smartphone makers to exclusively use its search engine if they want access to the Play Store, through which phone users can download and purchase other apps.Now the Commission has sent a redacted copy of that statement of objections to complainants, Reuters reported after seeing the document.To read this article in full or to leave a comment, please click here

ICANN will generate new DNSSec key

Rotating cryptographic keys is a security best practice, so it's good news that ICANN has begun the process to change the root key pair underpinning the security of the DNS. While the chances of a misstep is small, the fact remains that changing the root key pair has never been done before. A mistake can potentially -- temporarily -- break the Internet.No pressure, ICANN.[ Safeguard your data! The tools you need to encrypt your communications and web data. • Maximum-security essential tools for everyday encryption. • InfoWorld's encryption Deep Dive how-to report. | Discover how to secure your systems with InfoWorld's Security newsletter. ] As the phone book of the Internet, DNS translates easy-to-remember domain names into IP addresses so that users don't have to remember strings of numbers in order to access web applications and services. However, attackers can hijack legitimate DNS requests to divert users to fraudulent sites through DNS cache poisoning or DNS spoofing.To read this article in full or to leave a comment, please click here

Discussing Disruption to IT

Disruption has come to mean different things in the realm of IT. It’s difficult to read social media for a day without seeing the word "disruption" abused by the great marketing machine.

Using this word in the context of "disruption to service" or put it another way, "What happens when something doesn’t work?", it’s difficult to come up with a good anecdote to describe the impact of something going wrong when you’re in front of customers without sounding like another marketeer. I firmly believe in delivering value by "showing" as opposed to just battering your audience with slide ware. 

Still, in networking we are actually going through a period of huge change. The CLI skill set is still dominant and I’m not scare mongering when I say over time this will change. It will. It just won’t change as fast as some people will have you believe. Anyway, I digress. 

Fred

At college, I studied the greatest passion in life I had at the time, which was electronics. The local college department was ok and the material was industry standard stuff. Nothing crazy and out there, but useful and real. We had one super hero in the Continue reading

New products of the week 10.3.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Daptiv TTMKey features: With Daptiv TTM, teams can better track tasks and submit timesheets, stakeholders get a more accurate view of project status, and initiatives move forward on time and on budget. More info.To read this article in full or to leave a comment, please click here

New products of the week 10.3.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Daptiv TTMKey features: With Daptiv TTM, teams can better track tasks and submit timesheets, stakeholders get a more accurate view of project status, and initiatives move forward on time and on budget. More info.To read this article in full or to leave a comment, please click here

Can you hack the vote? Yes, but not how you might think

With Donald Trump already talking about the presidential election being rigged, Symantec has set up a simulated voting station that shows how electronic systems might be hacked to alter actual vote tallies for just a few hundred dollars.+More on Network World: Was Trump bitten by Twitter time-stamp bug that stung Alec Baldwin’s wife?+They found that while it’s possible to change the number of votes cast for each candidate, it would be very difficult to do so on a large enough scale to swing the election one way or the other.To read this article in full or to leave a comment, please click here

Seattle substation is cool enough to draw a crowd

Welcome to the substationImage by NBBJThe typical substation is a high-voltage blot on the landscape. But not this one. Seattle’s Denny substation is under construction in a dense urban neighborhood instead of being screened from the public, and it aims to welcome pedestrians rather than fence out trespassers.To read this article in full or to leave a comment, please click here

Building a Raspberry Pi-powered Barkometer, Part 4

In Part 3 of my epic series “Building a Raspberry Pi-powered Barkometer”, I covered how to capture audio using the arecord command and how I’d discovered that I got better sound out of an old USB webcam than the fancy-schmancy (but very cheap) USB sound card I started out with. I wound up in Part 3 collecting 60-second sound files in WAV format in a subdirectory on the Raspberry Pi, each named for the sample’s start time (e.g. 2016-09-07-04-42-27.wav).We need to get these files off of the RPi so we can analyze them. In theory, this could be done on the board but for now  we’ll FTP them to another machine for analysis. So, to get the recordings to somewhere we can slice and dice them, we’re going to use ncftpput, an FTP utility included the ncftp package. To install ncftp we'll run the following command on the RPi command line (as always, when installing a new package, you should run sudo apt-get update first):To read this article in full or to leave a comment, please click here