Archive

Category Archives for "Networking"

22% off iHealth Oxygen level, Pulse rate, and Perfusion Index Monitor – Deal Alert

This handy meter gives fast and reliable readings of your oxygen level, pulse rate, and perfusion index, wirelessly on your smartphone or tablet. Using the iHealth app, easily record and save your data to the secure, HIPPA compliant iHealth cloud for meaningful results you can track over time for yourself or a caregiver. This iHealth monitor typically lists for $69.95, but is currently discounted 22% to $54.33. See the discounted item now on Amazon.To read this article in full or to leave a comment, please click here

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub's bug bounty, Flash vulnerabilities and Zica prevention at the Rio Olympics all came up on this week's Bugs & Bugs Facebook Live event, the program on which we discuss the latest in computer bugs and real insects (view saved version of video below).As my colleague Tim Greene, our resident IT security editor discusses, next week's Black Hat event in Las Vegas will be filled with intriguing presentations by white hat hackers sharing their latest exploits, including one involving Bluetooth Low Energy that could impact internet of things devices. Tim also hits on researchers taking Pornhub up on its $20K bug bounty challenge, which turns out to benefit PHP developers everywhere, and dives into the latest on Flash exploits, which Cisco warns can lead to ransomeware attacks.To read this article in full or to leave a comment, please click here

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub's bug bounty, Flash vulnerabilities and Zica prevention at the Rio Olympics all came up on this week's Bugs & Bugs Facebook Live event, the program on which we discuss the latest in computer bugs and real insects (view saved version of video below).As my colleague Tim Greene, our resident IT security editor discusses, next week's Black Hat event in Las Vegas will be filled with intriguing presentations by white hat hackers sharing their latest exploits, including one involving Bluetooth Low Energy that could impact internet of things devices. Tim also hits on researchers taking Pornhub up on its $20K bug bounty challenge, which turns out to benefit PHP developers everywhere, and dives into the latest on Flash exploits, which Cisco warns can lead to ransomeware attacks.To read this article in full or to leave a comment, please click here

Verizon, AT&T find new markets as traditional revenues flatten

With their purchases of DirecTV, AOL and Yahoo, the nation's two biggest wireless carriers -- AT&T and Verizon -- have pivoted beyond their traditional business in the search for alternative revenues.Those purchases -- the latest being Verizon's announcement Monday to snap up Yahoo for $4.8 billion -- came about because the carriers realized more than two years ago that traditional wireless services are becoming saturated in the U.S. As a result, wireless services revenues have shrunk or remained flat in recent quarters.To read this article in full or to leave a comment, please click here

Intel has quietly snuffed out its Project Tango smartphone as it rethinks augmented reality

Intel's RealSense 3D camera technology was the star of last year's Intel Developer Forum in San Francisco. Along with robots and drones that used RealSense to "see" the world around them, CEO Brian Krzanich showed the first prototype smartphone to incorporate the technology.The phone went on sale in January for US$399, along with a software kit that allowed developers to built augmented reality applications using RealSense and Google's Project Tango platform. It put Intel on the front edge of mobile AR, a technology that's now having its breakout moment thanks to Pokémon Go.To read this article in full or to leave a comment, please click here

Google lets third parties extend its productivity software on Android

Google is using third parties to make its productivity apps more useful on Android. The company announced Thursday that it's now possible to bring functionality from apps like Scanbot, DocuSign, and ProsperWorks into Docs and Sheets on its mobile operating system.The third-party add-ons will let users do things like access CRM data, start to electronically sign a document, and create mobile apps based on data they have stored in a spreadsheet. The new add-ons are aimed at making it easier for people to get work done within Google Docs and Sheets while they're on the go.Google is in tight competition with Microsoft to attract users to its productivity suite, and both companies are working to bring the power of third-party applications into the apps people already use to get things done.To read this article in full or to leave a comment, please click here

PQ Show 87: Private Cloud Is For Real

Todays Priority Queue looks at the real state of private cloud. While public cloud gets the most media attention, and some analyst firms argue that private cloud doesnt make sense for most companies, its a myth that theres only one way to do cloud. The post PQ Show 87: Private Cloud Is For Real appeared first on Packet Pushers.

Anticipating Black Hat

I was at CiscoLive a few weeks ago in the 100 degree+ heat of Las Vegas and like other cybersecurity professionals I am off to Sin City again next week for Black Hat.Now Black Hat has become a technically-focused little brother of the RSA Security Conference, chock full of cybersecurity geeks at the beginning of the week and forensic investigators, researchers, analysts, and hackers as Black Hat turns to Defcon.  Given this focus, I’m looking forward to hearing about a number of things including:1.      Anti-ransomware fact and hyperbole.  Last December, I predicted a rise in ransomware in my blog, even going so far to talk about enterprise ransomware that impacted multiple systems on the network simultaneously.  Unfortunately, I was right about this one as ransomware has become a cybersecurity scourge of 2016.  Nasty stuff and once you’re hit, there is little you can do except replace the hard drive, reimage systems and hope you’ve done a recent full backup.  Alternatively, you can pony up a bunch of rubles to Vladimir in Odessa.  Nevertheless, there are in fact ways to prevent ransomware before it bricks your system.  New types of Continue reading

Anticipating Black Hat

I was at CiscoLive a few weeks ago in the 100 degree+ heat of Las Vegas and like other cybersecurity professionals I am off to Sin City again next week for Black Hat.Now Black Hat has become a technically-focused little brother of the RSA Security Conference, chock full of cybersecurity geeks at the beginning of the week and forensic investigators, researchers, analysts, and hackers as Black Hat turns to Defcon.  Given this focus, I’m looking forward to hearing about a number of things including:1.      Anti-ransomware fact and hyperbole.  Last December, I predicted a rise in ransomware in my blog, even going so far to talk about enterprise ransomware that impacted multiple systems on the network simultaneously.  Unfortunately, I was right about this one as ransomware has become a cybersecurity scourge of 2016.  Nasty stuff and once you’re hit, there is little you can do except replace the hard drive, reimage systems and hope you’ve done a recent full backup.  Alternatively, you can pony up a bunch of rubles to Vladimir in Odessa.  Nevertheless, there are in fact ways to prevent ransomware before it bricks your system.  New types of Continue reading

Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.The operation, dubbed AdGholas, has been running since at least October 2015. According to security vendor Proofpoint, the gang behind it managed to distribute malicious advertisements through more than 100 ad exchanges, attracting between 1 million and 5 million page hits per day.The Proofpoint researchers estimate that 10 to 20 percent of computers that loaded the rogue ads were redirected to servers hosting exploit kits -- web-based attack tools that attempt to silently exploit vulnerabilities in popular applications in order to install malware.To read this article in full or to leave a comment, please click here

Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.The operation, dubbed AdGholas, has been running since at least October 2015. According to security vendor Proofpoint, the gang behind it managed to distribute malicious advertisements through more than 100 ad exchanges, attracting between 1 million and 5 million page hits per day.The Proofpoint researchers estimate that 10 to 20 percent of computers that loaded the rogue ads were redirected to servers hosting exploit kits -- web-based attack tools that attempt to silently exploit vulnerabilities in popular applications in order to install malware.To read this article in full or to leave a comment, please click here

Microsoft brings Edge JavaScript engine to Linux, Mac OS X

If you ever needed a sign that a new era has dawned at Microsoft, this is it: The company announced it is bringing ChakraCore to Linux and OS X. ChakraCore is the main element of the Chakra JavaScript engine used in both the Microsoft Edge browser and the company's Universal Windows Platform. So, the company whose not-invented-here mentality was so iron-clad in the 1990s is now developing a JavaScript browser and app engine for its two competitor desktop operating systems. + Also on Network World: Microsoft cozies up to Linux containers +To read this article in full or to leave a comment, please click here

Florida men sue Microsoft over ‘coerced’ upgrades to Windows 10

Three Florida men have filed a lawsuit in a Florida federal court against Microsoft, charging that the company "coerced" them into upgrading to Windows 10 and that the "unintentional" upgrades damaged their PCs, resulting in lost time and money.The three -- Al Khafaji, Ahmad Abdulreda and Robert Stahl -- were the first to sue Microsoft at the federal level for running a campaign to get Windows 7 and Windows 8.1 users to accept the free upgrade to Windows 10. That offer expires Friday.INSIDER Review: Enterprise guide to Windows 10 "Microsoft engaged in a reckless and negligent premise with catastrophic consequences for some of Defendant's customers whose devices were rendered useless and incapable of normal recovery operations," the complaint stated. "Plaintiffs were coerced into adopting Windows 10 or had Windows 10 installed in various unintentional manners with subsequent damage to their computers after which Plaintiffs sustained unnecessary and avoidable stress, confusion, loss of time and significant monetary damage all at the hands of Defendant."To read this article in full or to leave a comment, please click here

IDG Contributor Network: $1 trillion in IT spending to be ‘affected’ by the cloud

IT is moving to the cloud big time, says research and consulting firm Gartner. And while we’ve been aware of that for a while, the firm has also been coming up with some staggering corroborating numbers.It says that by 2020, $1 trillion in IT spending will be “affected” by the shift to cloud. That’s roughly a little under a third of all IT spending, which in 2015 was $3.41 trillion globally and is projected to be $3.79 trillion in 2020, according to Gartner’s Q2 2016 forecast, published earlier this month.+ Also on Network World: Spending on public cloud IT infrastructure to hit $23.3 billion +To read this article in full or to leave a comment, please click here

IDG Contributor Network: $1 trillion in IT spending to be ‘affected’ by the cloud

IT is moving to the cloud big time, says research and consulting firm Gartner. And while we’ve been aware of that for a while, the firm has also been coming up with some staggering corroborating numbers.It says that by 2020, $1 trillion in IT spending will be “affected” by the shift to cloud. That’s roughly a little under a third of all IT spending, which in 2015 was $3.41 trillion globally and is projected to be $3.79 trillion in 2020, according to Gartner’s Q2 2016 forecast, published earlier this month.+ Also on Network World: Spending on public cloud IT infrastructure to hit $23.3 billion +To read this article in full or to leave a comment, please click here

DC Fabric Segment Routing Use Case (2)

In the first post we covered a bit of the basics around segment routing in the data center. Let’s return to the first use case to see if we can figure out how we’d actually implement the type of traffic steering needed to segregate mouse and elephant flows. Let’s return to our fabric and traffic flows and think about how we could shape traffic using segment routing.

benes-segment

There are two obvious ways to shape traffic in this way—

IGP-Prefix segments

The first way would be to impose a label stack that forces traffic along a path that touches, or passes through, each of the devices along the path. In this case, that would mean imposing a path on the traffic originating behind the ToR at A so it must pass through [F,G,D,E]. The flow of traffic through the data center will look something like—

  • Somehow classify the traffic as belonging to the flow that should be shaped to follow only the [F,G,D,E] path
  • Impose the path as a label stack, so the SR header (really just a label stack in this situation, remember?) will contain [F,G,D,E]
  • Forward the packet, with the label, to the next hop in the stack, Continue reading