Archive

Category Archives for "Networking"

IT’S ALIVE! DARPA looks to build programmable, self-healing, living building materials

Perhaps one day we’ll see bridges that repair themselves or houses that could restore walls after a fire.Sounds a bit like science fiction yes but a new program announced by the masters of making science fiction fact, the Defense Advanced Research Projects Agency, this week announced a program that would combine the structural properties of traditional building ingredients with attributes of living systems to offer a class of living material that could be grown where needed, self-repair when damaged and respond to changes in their surroundings.To read this article in full or to leave a comment, please click here

Black Hat and DEF CON: The song remains the same

Yes, history repeats itself. I’m looking at the July 20-27, 2009, issue of Network World.The front page headlines are:- Black Hat to expose attacks- Microsoft’s embrace of Linux seen as strategic- Data Loss Prevention Clear Choice Test- Burning Questions:1) Are mobile Web apps ever going to grow up?2) How much longer are you going to hang onto that Ethernet cable?3) Do you have any idea how much money you’re wasting on international wireless services?I saw Network World's Tim Greene, author of the 2009 Black Hat article, sitting in the working press area, seven years later, typing furiously.To read this article in full or to leave a comment, please click here

Black Hat and DEF CON: The song remains the same

Yes, history repeats itself. I’m looking at the July 20-27, 2009, issue of Network World.The front page headlines are:- Black Hat to expose attacks- Microsoft’s embrace of Linux seen as strategic- Data Loss Prevention Clear Choice Test- Burning Questions:1) Are mobile Web apps ever going to grow up?2) How much longer are you going to hang onto that Ethernet cable?3) Do you have any idea how much money you’re wasting on international wireless services?I saw Network World's Tim Greene, author of the 2009 Black Hat article, sitting in the working press area, seven years later, typing furiously.To read this article in full or to leave a comment, please click here

33% off Kinsa Smart Thermometer – Deal Alert

Kinsa Smart Thermometer takes accurate readings in just 10 seconds. It is also incredibly durable, comfortable, and easy to use.  With the free iOS & Android app it remembers and records fever, symptoms and medications for each family member on your phone so you don’t have to. Keep track for yourself, another caregiver, or your doctor.To read this article in full or to leave a comment, please click here

Adware turns a tidy profit for those who sneak it into downloads

If you've ever downloaded software, chances are you've experienced an all-too-common surprise: ads or other unwanted programs that tagged along for the ride, only to pop up on your PC uninvited. Turns out there's a highly lucrative global industry making it happen, with "layers of deniability" to protect those involved.That's according to researchers from Google and New York University's Tandon School of Engineering, who will present this week what they say is the first analysis of the link between so-called "pay-per-install" (PPI) practices and the distribution of unwanted software.To read this article in full or to leave a comment, please click here

90% off Become an Ethical Hacker With This Complete eLearning Bundle – Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical hacking trade with the Become an Ethical Hacker Bundle, now only $44.99 for a limited time.To read this article in full or to leave a comment, please click here

AT&T fined after suspected drug traffickers slip charges into phone bills

AT&T will pay a $7.75 million fine for allowing suspected drug traffickers to add millions of dollars in bogus directory assistance charges to its customers' land-line bills.The extra charges of about $9 a month were discovered during an investigation of two Cleveland-area companies for drug-related crimes and money laundering, the Federal Communications Commission said Monday."A phone bill should not be a tool for drug traffickers, money launderers, and other unscrupulous third parties to fleece American consumers," FCC Enforcement Bureau Chief Travis LeBlanc said in a statement. The settlement will allow AT&T customers "charged for this sham service" to get their money back, he said.To read this article in full or to leave a comment, please click here

Riding the Wave of Linux Greatness

We at Cumulus Networks firmly believe that Linux networking is awesome, as it provides a high function, extensible platform for networking. Linux has always been the platform of choice for decades; every system today starts with Linux as its base and builds around it.

With the advent of the virtual machine and container networking, the constructs that used to be relegated to physical switches are applicable on servers, we thrive on the fact that Cumulus Linux networking IS Linux networking.

So, what does it take to bring that the greatest and latest in Linux to you? It takes two things really:

  • The latest Linux kernel, with all the new features and facilities.
  • The latest system libraries that enable those features for applications and the latest versions of the huge ecosystem of Linux software packages.

Kernel at the Core

The kernel is the center of the Linux operating system. We work closely with the Linux kernel community to add new networking features or extend Linux networking APIs for NOSes. With Cumulus Linux 3.0, we started with Linux kernel version 4.1 and networking patches from even more recent kernels. This provides networking applications with the latest Linux APIs, Continue reading

snaproute Go BGP Code Dive (7): Moving to Connect

In last week’s post, we looked at how snaproute’s implementation of BGP in Go moves into trying to connect to a new peer—we chased down the connectRetryTimer to see what it does, but we didn’t fully work through what the code does when actually moving to connect. To jump back into the code, this is where we stopped—

func (st *ConnectState) processEvent(event BGPFSMEvent, data interface{}) {
  switch event {
  ....
    case BGPEventConnRetryTimerExp:
      st.fsm.StopConnToPeer()
      st.fsm.StartConnectRetryTimer()
      st.fsm.InitiateConnToPeer()
....

code-diveWhen the connectRetryTimer timer expires, it is not only restarted, but a new connection to the peer is attempted through st.fsm.InitiateConnToPeer(). This, then, is the next stop on the road to figuring out how this implementation of BGP brings up a peer. Before we get there, though, there’s an oddity here that needs to be addressed. If you look through the BGP FSM code, you will only find this call to initiate a connection to a peer in a few places. There is this call, and then one other call, here—

func (st *ConnectState) enter() {
  ....
  st.fsm.AcceptPeerConn()
  st.fsm.InitiateConnToPeer()
}

The rest of the instances of InitiateConnToPeer() are related to the definition of the function. Continue reading

DARPA wants to build very low frequency wireless systems

Wireless transmitters that operate at very or ultra low frequencies (0.3‐30 kHz) typically require some big antenna complexes to handle their communications. Scientists at the Defense Advanced Research Projects Agency (DARPA) said they are interested looking to eliminate that issue and develop smaller physical structures that could handle new long-distance communication applications. + DARPA wants huge Holy Grail of mobile ad hoc networks DARPA in search of a 100 Gb/sec wireless technology that can penetrate clutter+To read this article in full or to leave a comment, please click here

Hackers hit Oracle’s Micros payment systems division

Russian cybercriminals have infiltrated systems at Micros, an Oracle division that is one of the world's biggest vendors of point of sale payment systems for shops and restaurants, according to an influential security blogger.The hack has affected 700 computer systems at Micros and is thought to have begun with infiltration on a single machine at the company, said Brian Krebs on his Krebs on Security blog on Monday.The incident is worrying for the potential size of the hack and the systems affected. Oracle acquired Micros in 2014, when it said Micros systems are used in more than 330,000 sites in 180 countries.To read this article in full or to leave a comment, please click here

Hackers hit Oracle’s Micros payment systems division

Russian cybercriminals have infiltrated systems at Micros, an Oracle division that is one of the world's biggest vendors of point of sale payment systems for shops and restaurants, according to an influential security blogger.The hack has affected 700 computer systems at Micros and is thought to have begun with infiltration on a single machine at the company, said Brian Krebs on his Krebs on Security blog on Monday.The incident is worrying for the potential size of the hack and the systems affected. Oracle acquired Micros in 2014, when it said Micros systems are used in more than 330,000 sites in 180 countries.To read this article in full or to leave a comment, please click here

4 signs you’re a victim of ransomware

The word ransomware conjures images of kidnappers and ransom notes. But that doesn't quite capture the reality of PC ransomware. In fact, "it’s not always obvious when ransomware is the problem," says Mike Cobb, director of engineering at data recovery and digital forensics firm DriveSavers.To read this article in full or to leave a comment, please click here(Insider Story)

Hacked companies still prioritize innovation over cybersecurity

Eight out of 10 executives surveyed acknowledge that their companies had been compromised by cyber attacks in the past two years, according to a new study by KPMG. Yet less than half of the 403 CIOs, CISOs and CTOs the firm surveyed said that they had invested in information security in the past year.“We’re still seeing companies taking a passive or reactive approach toward cybersecurity, when in fact cyber should be a top-line business issue thought about and practiced company-wide," says Greg Bell, leader of KPMG's U.S. cyber practice. Bell spoke to CIO.com after publishing his “Consumer Loss Barometer" report in July.To read this article in full or to leave a comment, please click here

Why (and how) to start planning your HoloLens apps

Augmented reality isn't new. Boeing has been using it since the 1990s to speed up installing the hundreds of miles of writing inside its planes. But those early systems were both clunky and expensive, and, so far, more portable augmented reality wearables like Google Glass haven't taken off. Microsoft's mixed reality HoloLens looks set to change that.To read this article in full or to leave a comment, please click here(Insider Story)