Archive

Category Archives for "Networking"

Why I switched back to Firefox

Remember when you ditched Firefox for Chrome and pinkie-swore you’d never go back? Yeah, me too. But recently I needed to test a web-based app in Firefox, so, with some hesitance, I took the plunge and installed it.To read this article in full or to leave a comment, please click here(Insider Story)

10 things we love about the new Firefox browser

Loving FirefoxRemember when you ditched Firefox for Chrome and pinkie-swore you’d never go back? Yeah, me too. But recently I needed to test one of our web-based apps in Firefox, so, with some hesitance, I took the plunge and installed it. Turns out, the good folks at Mozilla took their vanishing market share to heart and fought back with one of the most notably improved products I have seen in recent memory. Here are 10 things we love about Firefox. (Read the full story.)To read this article in full or to leave a comment, please click here

New products of the week 5.23.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Zuznow “Red Fox” versionKey features: A frontend-as-a-Service (FaaS) platform, the new Zuznow “Red Fox” version automatically creates and maintains web and native apps for smartphones, tablets, desktops and laptops. Enterprises can build and deploy premium mobile apps in minutes – without coding – through a simple, three-step configuration wizard. More info.To read this article in full or to leave a comment, please click here

New products of the week 5.23.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Zuznow “Red Fox” versionKey features: A frontend-as-a-Service (FaaS) platform, the new Zuznow “Red Fox” version automatically creates and maintains web and native apps for smartphones, tablets, desktops and laptops. Enterprises can build and deploy premium mobile apps in minutes – without coding – through a simple, three-step configuration wizard. More info.To read this article in full or to leave a comment, please click here

Thoughts on Luminus Networks

Late last week, Cyrus Durgin from Luminus Networks published an article on SDx Central titled “The (R)evolution of Network Operations.” You may notice that my name is mentioned at the bottom of the article as someone who provided feedback. In this post, I’d like to share some thoughts—high-level and conceptual in nature—on network operations and Luminus Networks.

I was first introduced to Luminus Networks when I met its CEO, Kelly Wanser, at the Open Networking User Group (ONUG) meeting in New York City last November. We met again in the Denver area in late December, and Kelly gave me a preview of what Luminus was building. I must confess that I was immediately intrigued by what Kelly was describing. One key thing really jumped out at me: we need to treat the network as a system, not as a bunch of individual elements.

When it comes to network monitoring/management/operations, so many of the tools are focused on the individual elements that comprise a network: provisioning a switch, pushing configuration changes to a router or group of routers, polling counters from interfaces on switches, etc. While there’s nothing wrong with any of these things, it seems to me that there’s Continue reading

Docker Networking: macvlan bridge

Docker takes a slightly different approach with its network drivers, confusing new users which are familiar with general terms used by other virtualization products. If you are looking for a way to bridge the container into a physical network, you have come to the right place. You can connect the container into a physical Layer 2 network by using macvlan driver. If you are looking for a different network connection, refer to my docker network drivers post.

Before I begin, you should check some basics on what macvlan is, why it is a better alternative to a linux bridge and how it compares with ipvlan.

Important: As of Docker 1.11 macvlan network driver is part of Docker’s experimental build and is not available in the production release. You can find more info on how to use the experimental build here. If you are looking for a production ready solution to connected your container into a physical Layer 2 network, you should stick to pipework for the time being.

Last but not least, macvlan driver requires Linux Kernel 3.9 or greater. You can check your kernel version with uname -r. If you’re running RHEL (CentoOS, Continue reading

OpenNSL

Open Network Switch Layer (OpenNSL) is a library of network switch APIs that is openly available for programming Broadcom network switch silicon based platforms. These open APIs enable development of networking application software based on Broadcom network switch architecture based platforms.

The recent inclusion of the APIs needed to enable sFlow instrumentation in Broadcom hardware allows open source network operating systems such as OpenSwitch and Open Network Linux to implement the sFlow telemetry standard.

Kansas Heart Hospital hit with ransomware, paid, but attackers demanded 2nd ransom

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital president Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant; he said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files – at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here

Kansas Heart Hospital hit with ransomware; attackers demand two ransoms

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday, and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital President Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant. He said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files—at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here

Kansas Heart Hospital hit with ransomware, paid, but attackers demanded 2nd ransom

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital president Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant; he said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files – at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here

Kansas Heart Hospital hit with ransomware; attackers demand two ransoms

Kansas Heart Hospital in Witchita was hit with ransomware last week. The ransomware attack occurred on Wednesday, and the KWCH 12 news video from Friday night said some files were still inaccessible by the hospital.Hospital President Dr. Greg Duick refused to disclose the ransom amount and the ransomware variant. He said, “I'm not at liberty because it's an ongoing investigation, to say the actual exact amount. A small amount was made.”Yes, the hospital paid the ransom. No, the hackers didn’t decrypt the files—at least it was described as not returning “full access to the files.” Instead, the attackers asked for another ransom. This time the hospital refused to pay because it was no longer “a wise maneuver or strategy.”To read this article in full or to leave a comment, please click here

Boston BSides needs more space to grow

 The Boston BSides conference is bursting at its seams and may have to find a new place to carry out its mission of providing inexpensive IT security training, educational sessions and informal networking where peers can share experiences and help guide aspiring security pros.The conference this weekend at Microsoft’s New England Research and Development (NERD) Center in Cambridge, Mass., was full to capacity with about 400 people attending – the NERD limit, says Daniel Reich, one of the show’s organizers.He says the organizers had to turn away about 100 others who wanted to attend, and after reading surveys by attendees and comments on Twitter, they may be looking for a larger venue for next year.To read this article in full or to leave a comment, please click here

Boston BSides needs more space to grow

 The Boston BSides conference is bursting at its seams and may have to find a new place to carry out its mission of providing inexpensive IT security training, educational sessions and informal networking where peers can share experiences and help guide aspiring security pros.The conference this weekend at Microsoft’s New England Research and Development (NERD) Center in Cambridge, Mass., was full to capacity with about 400 people attending – the NERD limit, says Daniel Reich, one of the show’s organizers.He says the organizers had to turn away about 100 others who wanted to attend, and after reading surveys by attendees and comments on Twitter, they may be looking for a larger venue for next year.To read this article in full or to leave a comment, please click here

There’s finally reason to hope in the war against ransomware

Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do.These options include both hardware and software approaches IT pros can take to defeat the malware, a group at this weekend’s Security BSides Boston conference was told.By looking at how several variants of ransomware work - CryptoLocker, CryptoWall, Locky, SamSam - researcher Weston Hecker found characteristics of their behavior that could be turned against them.One method goes after the droppers that first infect target machines in preparation for downloading the main malware payloads. Their purpose is to examine the machines for indications that it might be an inhospitable host and to eliminate the roadblocks if possible.To read this article in full or to leave a comment, please click here

There’s finally reason to hope in the war against ransomware

Now when ransomware tries to take over your computer, there’s something you can be sides pay up: stop it, buy more time to deal with it or mitigate the damage it might do.These options include both hardware and software approaches IT pros can take to defeat the malware, a group at this weekend’s Security BSides Boston conference was told.By looking at how several variants of ransomware work - CryptoLocker, CryptoWall, Locky, SamSam - researcher Weston Hecker found characteristics of their behavior that could be turned against them.One method goes after the droppers that first infect target machines in preparation for downloading the main malware payloads. Their purpose is to examine the machines for indications that it might be an inhospitable host and to eliminate the roadblocks if possible.To read this article in full or to leave a comment, please click here

Mininet dashboard

Mininet Dashboard has been released on GitHub, https://github.com/sflow-rt/mininet-dashboard. Follow the steps in Mininet flow analytics to install sFlow-RT and configure sFlow instrumentation in Mininet.

The following steps install the dashboard and start sFlow-RT:
cd sflow-rt
./get-app.sh sflow-rt mininet-dashboard
./start.sh
The dashboard web interface shown in the screen shot should now be accessible. Run a test to see data in the dashboard. The following test created the results shown:
sudo mn --custom extras/sflow.py --link tc,bw=10 --topo tree,depth=2,fanout=2 --test iperf
The dashboard has three time series charts that update every second and show five minutes worth of data. From top to bottom, the charts are:
  1. Top Flows - Click on a peak in the chart to see the flows that were active at that time.
  2. Top Ports - Click on a peak in the chart to see the ingress ports that were active at that time.
  3. Topology Diameter - The diameter of the topology.
The dashboard application is easily modified to add additional metrics, generate events, or implement controls. For example, adding the following code to the end of the sflow-rt/app/mininet-dashboard/scripts/metrics.js file implements equivalent functionality to the large flow detection Python script described in Mininet flow analytics Continue reading

Stressed? Low energy? The answer is Thync

Stressed? Of course you are. Do you find it hard to chill without a drink or three in the evening? Yep, that’s pretty common when you’re dealing with the kind of pressures IT professionals are often under. And then what about when you get up in the morning? Are you low on energy? How about when it’s 2pm and you’re flagging and there’s the prospect of having to pull an all-nighter to roll out the new whatever-it-is you’re wrestling with? Do you turn to endless cups of coffee or, the gods forfend, do you down endless energy drinks until you have a caffeine high that makes you vibrate like a tuning fork? To read this article in full or to leave a comment, please click here

iPhone 7 Rumor Rollup: ‘actual’ renders; 3 not 2 versions; 4 never-going-to-happens

No one has ever mistaken me for a gadget guy, but the regular author of our “iPhone 7 Rumor Rollup” is unavailable this week so into the breach I step. I do carry an iPhone 5s, but, truth be told, there is close to zero chance that I will be upgrading. Nonetheless, in addition to genuine iPhone 7 rumors I intend to offer here a few suggestions that could conceivably up my upgrade odds.Behold ‘exclusive’ renders The language used by Apple sites to convey the fruits of their rumor farming is an art form in and of itself. Take this headline from GSM Arena: “Exclusive: Apple iPhone 7 renders appear.” Exclusive is self-explanatory, though at times less than accurate. The interesting use here is “appear,” as in out of thin air. This wasn’t the case at all.To read this article in full or to leave a comment, please click here