Archive

Category Archives for "Networking"

OurMine hacked Variety, power-spammed subscribers

Two different hacking groups, both which claim to be of the non-malicious variety, have been busy bringing suspended Twitter accounts back from the dead and power-spamming Variety subscribers.OurMine hacked Variety, power-spammed subscribersIf folks who like news about Hollywood hadn’t heard of the hacking group OurMine, then some of them are very familiar with the group’s name now.OurMine reportedly compromised Variety’s content management system around 9 am PT on Saturday and published a post which Engadget said was later removed, but the hacking collective’s antics didn’t stop there. Variety’s subscribers were hammered with spam.To read this article in full or to leave a comment, please click here

Building a Raspberry Pi-powered Barkometer, Part 2

In the first part of this project I discussed the goal, to wit, to document and quantify how often my dog barks, and discussed the hardware I planned to use. One component I neglected to mention was the Edimax N150 Wi-Fi Nano USB Adapter which, after some experimentation, I discovered was a problem when the USB sound card was in an adjacent USB port because every sound sample I captured started with a burst of noise lasting 30 to 75 seconds.To read this article in full or to leave a comment, please click here

IBM’s Watson looks for a role in the home

Not content with helping cure cancers and winning Jeopardy, Watson wants to get inside our heads and our homes, whispering instructions into our wireless headsets and helping us do our laundry.That's the message from IBM's global head of Watson IoT, Harriet Green, in a keynote speech here at IFA in Berlin.IBM will work with appliance maker Whirlpool, TV and camera company Panasonic, wireless headphone designer Bragi and Withings owner Nokia to add Watson's cognitive computing capabilities to their products, the company said.Those cognitive capabilities could help devices talk with one another, or with us.For example, a washing machine could tell a dryer what program to use for the clothes it has just washed, or tell its owner when to order more detergent. Computer vision techniques could help security cameras distinguish between friends and strangers or identify suspicious activity. And natural language processing and text-to-speech capabilities could let wireless headphones translate for us or read us instruction manuals when our hands are full.To read this article in full or to leave a comment, please click here

Sony previews prototype Xperia gadgets

Sony is looking at taking the Xperia brand beyond smartphones and is showing off some prototype gadgets at the IFA trade show in Berlin. It was keen to underline that not all of them might make it to manufacturing, but those on display were fully working prototypes with hardware and software stable enough that the company let a reporter test them out.Xperia Projector Magdalena Petrova Sony's Xperia Projector on show at IFA in Berlin on September 1, 2016.To read this article in full or to leave a comment, please click here

Sam Labs shows off a new educational electronics kit — with no wires

Perhaps you're old enough to remember when building interactive electronic devices involved breadboards, soldering irons and assembly code.Tell young people today that, though, and they won't believe you -- especially if they've used one of the educational electronics sets Sam Labs is showing at IFA in Berlin.The components in these sets are the same as you would find in beginners' electronics kits of the 1970s and 80s: lamps, photo sensors, pushbuttons, potentiometers, tilt switches and DC motors.The big difference is, there are no wires.Instead, the components are mounted on small plastic blocks each containing a USB-rechargeable battery and a Bluetooth module. This lets them talk to one another and to a host PC, phone or tablet running Sam Labs' visual programming app.To read this article in full or to leave a comment, please click here

25 is the New 10

I am continually amazed at the productivity of the Cumulus Networks development team who recently collaborated with the Mellanox development team to do some amazing things in this new Cumulus Linux 3.1 release. Besides innovating on a number of important new software features, they added support for five new switches from Mellanox, including the first native 25 Gigabit Open Ethernet switch as well as the highest capacity 10/100GbE switch on the market.

 

Screen Shot 2016-08-22 at 7.54.46 AM

The Mellanox SN2410 is the industry’s first generally available switch with native 25 Gigabit Ethernet (25GbE) ports. Working for *the* provider of 99% of all 25GbE NICs sold worldwide, I can say with confidence that, until now, all 25GbE servers have been connected to 100GbE switch ports via breakout cables. The SN2410 changes all that by providing 48 SFP28 ports that can natively operate in 1G, 10G, or 25G modes, which is great for cutting-edge deployments while providing backward compatibility for legacy devices. Just like 10GbE SFP+ ports, the 25GbE SP28 ports can utilize inexpensive passive copper direct-attach cables.

Who needs 25 Gigabit Ethernet?

Without my naming names, you can safely assume that the hyperscalers and other early consumers of 10GbE are now moving to 25GbE Continue reading

A mystery user breached an email account on Clinton’s server

In 2013, an unknown user accessed an email account on Hillary Clinton’s private email server through Tor, the anonymous web surfing tool, according to new FBI documents.On Friday, the FBI provided details on the possible breach in newly released files about its investigation of Clinton’s use of a private email server when she was the U.S. secretary of state.The affected email account belonged to a member of Bill Clinton's staff. In January 2013, an unknown user managed to log in to the account and browse email folders and attachments.To read this article in full or to leave a comment, please click here

A mystery user breached an email account on Clinton’s server

In 2013, an unknown user accessed an email account on Hillary Clinton’s private email server through Tor, the anonymous web surfing tool, according to new FBI documents.On Friday, the FBI provided details on the possible breach in newly released files about its investigation of Clinton’s use of a private email server when she was the U.S. secretary of state.The affected email account belonged to a member of Bill Clinton's staff. In January 2013, an unknown user managed to log in to the account and browse email folders and attachments.To read this article in full or to leave a comment, please click here

Quagga Routing Software with EIGRP Support

In May 2013, Cisco opened its proprietary EIGRP protocol and released an informational RFC 7868 - Cisco's Enhanced Interior Gateway Routing Protocol (EIGRP). It gives other vendors an opportunity to implement EIGRP protocol into their devices. A group students led by an assistant professor and Cisco CCIE Peter Paluch who is an instructor trainer at the Faculty of Management Science and Informatics, University of Zilina, Slovakia implemented EIGRP support into Quagga routing software.

The goal of this tutorial is to provide a VMware vmdk disk with installed Linux Core and Quagga which supports Cisco EIGRP protocol. The image can be used to test compatibility between EIGRP configured on native Cisco devices and an implementation of EIGRP daemon in Quagga . I also share my findings about issues that I have noticed during my tests.

Here you can download Linux Core vmdk disk with installed Quagga 0.99.24-rc1 which supports EIGRP.

How did I create Quagga Qemu Image with EIGRP Support
I installed Linux Core 7.2 to Qemu virtual machine and remastered Core for sending output to a serial port according to this tutorial. I download Quagga version which supports EIGRP from github and I installed it from source. Afterwards I created Linux Core Quagga extension. I did not submit Continue reading

Point-of-sale data breaches have now reached the cloud

The latest in a string of hacks against retail point-of-sale systems has hit the operator of a cloud-based service with about 38,000 business clients.Montreal-based Lightspeed reported the breach on Thursday and said it affected a system that retailers can use from tablets, smartphones and other devices.  The incident occurs as a growing number of retailers and hotels have been targeted by hackers, who typically install malware into the point-of-sale systems to steal credit card numbers.To read this article in full or to leave a comment, please click here

Point-of-sale data breaches have now reached the cloud

The latest in a string of hacks against retail point-of-sale systems has hit the operator of a cloud-based service with about 38,000 business clients.Montreal-based Lightspeed reported the breach on Thursday and said it affected a system that retailers can use from tablets, smartphones and other devices.  The incident occurs as a growing number of retailers and hotels have been targeted by hackers, who typically install malware into the point-of-sale systems to steal credit card numbers.To read this article in full or to leave a comment, please click here

A series of tubes: What’s next for home automation

"A series of tubes" is one of the most famous explanations of what makes the internet work, but it's also what many Europeans use to heat their homes. That's made room-by-room heating automation difficult -- until now.Heating systems in Europe typically circulate hot water from a boiler to radiators around the home, with the pump and boiler controlled by a central thermostat. Programmable timers can boost the temperature on winter evenings or lower it at night.Generally, though, such control is an all-or-nothing, whole-home affair, making it impossible to heat the living room only in the evening but warm the bathroom for a morning shower. Smart controllers like Nest and its European competitors Tado and Netatmo can't change that, as the series of tubes in most homes doesn't allow for independent control of different heating zones.To read this article in full or to leave a comment, please click here