Archive

Category Archives for "Networking"

Microsoft fixes Windows flaw that Google divulged

Microsoft today patched a Windows vulnerability that was disclosed just over a week ago by researchers from Alphabet Inc.'s Google.In one of several security updates -- 14 to be exact -- Microsoft fixed the bug in the Windows kernel drivers that Google security engineers had revealed on Oct. 31, 10 days after notifying Microsoft of the vulnerability.Microsoft credited Neel Mehta and Billy Leonard of Google's Threat Analysis Group for reporting the flaw. Last week, the two said that because the vulnerability was being actively exploited, a disclose-within-seven-days policy applied.To read this article in full or to leave a comment, please click here

Microsoft fixes Windows flaw that Google divulged

Microsoft today patched a Windows vulnerability that was disclosed just over a week ago by researchers from Alphabet Inc.'s Google.In one of several security updates -- 14 to be exact -- Microsoft fixed the bug in the Windows kernel drivers that Google security engineers had revealed on Oct. 31, 10 days after notifying Microsoft of the vulnerability.Microsoft credited Neel Mehta and Billy Leonard of Google's Threat Analysis Group for reporting the flaw. Last week, the two said that because the vulnerability was being actively exploited, a disclose-within-seven-days policy applied.To read this article in full or to leave a comment, please click here

Competing hackers dampen the power of Mirai botnets

The malware behind last month's massive distributed denial-of-service attack in the U.S. appears to be losing its potency. Ironically, hackers are to blame for diluting its power.  The malware known as Mirai -- which is now available on the internet -- has become a bit too popular in the hacking community, according to security firm Flashpoint.Competing hackers have all been trying to take advantage of Mirai to launch new DDoS attacks. To do so, that means infecting the poorly secured internet-connected devices, such as surveillance cameras, baby monitors, and DVRs, that the malware was designed to exploit.To read this article in full or to leave a comment, please click here

Competing hackers dampen the power of Mirai botnets

The malware behind last month's massive distributed denial-of-service attack in the U.S. appears to be losing its potency. Ironically, hackers are to blame for diluting its power.  The malware known as Mirai -- which is now available on the internet -- has become a bit too popular in the hacking community, according to security firm Flashpoint.Competing hackers have all been trying to take advantage of Mirai to launch new DDoS attacks. To do so, that means infecting the poorly secured internet-connected devices, such as surveillance cameras, baby monitors, and DVRs, that the malware was designed to exploit.To read this article in full or to leave a comment, please click here

Google: Cloud won’t require customers to worry about infrastructure

Google infrastructure czar Urs Hölzle is focused on a cloud future where customers don't think about the infrastructure underlying all of the workloads they're running.In his view, one of the key advantages of the cloud is that customers can get the benefits of new hardware without having to completely rework their software."So that means you can have a million customers who move to that new hardware platform, not knowing they did," he said Tuesday at the Structure Conference in San Francisco. "Which means that you can really insert this new technology in a much faster cycle than you could if you did the same thing on-premises."That means companies can get quick, seamless improvements to performance, as opposed to an on-premises deployment. When operating their own data centers, companies must take the time to evaluate new hardware, and take the time to roll it out.To read this article in full or to leave a comment, please click here

26% off Western Digital 2TB My Passport Ultra Portable External Hard Drive – Deal Alert

If you're looking for a ton of portable storage at a rock bottom price, you may want to consider this deal currently available on Amazon. Rated 4.5 out of 5 stars from nearly 6,200 people (read reviews), this Western Digital external hard drive features fast USB 3.0 connectivity, is compatible with both PC and Mac, has optional 256-bit AES hardware encryption, automatic cloud backup, and comes with a 3-year warranty. List price is $119.99 but with the current 26% discount you can buy it now for $89 (See it on Amazon). To read this article in full or to leave a comment, please click here

Nvidia’s Pascal GPUs reach the cloud via IBM and Nimbix

Google, Amazon, and Facebook can magically recognize images and voices, thanks to superfast servers equipped with GPUs in their mega data centers.But not all companies can afford that level of resources for deep learning, so they turn to cloud services, where servers in remote data centers do the heavy lifting.Microsoft has made such cloud services trendy with Azure and is one of the few companies offering remote servers with GPUs, which excel in machine-learning tasks. But Azure uses older Nvidia GPUs, and it now has competition from Nimbix, which offers a cloud service with faster GPUs based on the Nvidia's latest Pascal architecture.To read this article in full or to leave a comment, please click here

Samsung embroiled in South Korean political scandal

South Korean investigators on Tuesday raided the offices of Samsung Electronics, as part of a probe into alleged political corruption at the highest levels of that country’s government.The administration of President Park Guen-hye – who is South Korea’s first female president, and the daughter of former President Park Chung-hee – has been rocked by allegations of influence peddling centered on a mysterious figure said to have influenced policy decisions in exchange for cash.+ ALSO ON NETWORK WORLD: Samsung apologizes for the exploding Note7 with a full-page ad | Phenomenal Note7 Phablet Flame-out Timeline +To read this article in full or to leave a comment, please click here

Nov 2016 Patch Tuesday: Microsoft released 14 security updates, 6 rated critical

In addition to releasing 14 security updates on Election Day Patch Tuesday, six of which are rated critical, the Microsoft Security Response Center responded to requests for better access to security update information; Microsoft’s solution was to release a preview of its new Security Update Guide, “a single destination for security vulnerability information.”MSRC added, “Instead of publishing bulletins to describe related vulnerabilities, the new portal lets our customers view and search security vulnerability information in a single online database.”To read this article in full or to leave a comment, please click here

Nov 2016 Patch Tuesday: Microsoft released 14 security updates, 6 rated critical

In addition to releasing 14 security updates on Election Day Patch Tuesday, six of which are rated critical, the Microsoft Security Response Center responded to requests for better access to security update information; Microsoft’s solution was to release a preview of its new Security Update Guide, “a single destination for security vulnerability information.”MSRC added, “Instead of publishing bulletins to describe related vulnerabilities, the new portal lets our customers view and search security vulnerability information in a single online database.”To read this article in full or to leave a comment, please click here

The Internet is Hostile: Building a More Resilient Network

In a recent post we discussed how we have been adding resilience to our network.

The strength of the Internet is its ability to interconnect all sorts of networks — big data centers, e-commerce websites at small hosting companies, Internet Service Providers (ISP), and Content Delivery Networks (CDN) — just to name a few. These networks are either interconnected with each other directly using a dedicated physical fiber cable, through a common interconnection platform called an Internet Exchange (IXP), or they can even talk to each other by simply being on the Internet connected through intermediaries called transit providers.

The Internet is like the network of roads across a country and navigating roads means answering questions like “How do I get from Atlanta to Boise?” The Internet equivalent of that question is asking how to reach one network from another. For example, as you are reading this on the Cloudflare blog, your web browser is connected to your ISP and packets from your computer found their way across the Internet to Cloudflare’s blog server.

Figuring out the route between networks is accomplished through a protocol designed 25 years ago (on two napkins) called BGP.

BGP allows interconnections between Continue reading

Reaction: Issue a press release

Ladies and gentlemen, start your crystal balls—it is close to the end of the year, that favorite time of prognosticators and analysts everywhere to tell us what is going to be “hot” and “not” next year. But before you drop out of a good conversation with your family, or sitting around the dinner table eating one more piece of pie, let me ask—have you ever checked on last year’s predictions?

Here is a favorite of mine: “Books will soon be obsolete in schools.” So up to the minute, right? So in touch with the reality of today. Only it’s not. This is Thomas Edison in 1913. While I wasn’t alive back then to read the papers, I can assure you I’ve heard many other folks make the same prediction in the intervening years. The way these sorts of predictions normally work is this:

  • Choose a technology that seems directly related to an existing way of doing things. The current way of doing things, or the current technology, needs to be widespread, recognizable, and somehow seen as “fundamental.” In the modern networking world, routers would be an equivalent.
  • Choose a date that is just far enough ahead to seem Continue reading

How to crack the coding challenge

Even for the most seasoned software engineer or developer with a background education in computer science or engineering, completing a coding challenge or a technical screening can be nerve-wracking. Now, imagine you’re a self-taught developer -- the anxiety levels skyrocket.But formal education in computer science, software programming and/or engineering is not mandatory, and in the current IT talent war, the need for those credentials is diminishing further. Many self-taught coders are just as competent as those with a formal degree. The trick is getting past the unconscious biases levied against those without a degree.“From talking to self-taught programmers, I’ve found that one of their biggest sources of fear is the knowledge that they don’t have a degree. Non-traditional candidates are really intimidated by technical screenings, coding interviews, because they’ve been made to feel they’re not qualified without that computer science degree. But I don’t feel that’s true,” says Gayle Laakmann McDowell, founder of technical career consulting firm CareerCup and author of Cracking the Coding Interview.To read this article in full or to leave a comment, please click here