Archive

Category Archives for "Networking"

9 free Windows apps that can solve Wi-Fi woes

If you believed the vendors, you'd think Wi-Fi was simple: Turn on your computer or other device, hop on the Internet and you're set to go.But as we all know, life isn't quite that easy. Your home or office network can have dead spots where devices can't seem to connect, or where the connections get slow or flaky. Public hotspots can make you prey for hackers and snoopers. And when you are at a hotspot, you might need to share your connection with your other devices, including smartphones and tablets.MORE ON NETWORK WORLD: How to use public Wi-Fi hotspots safely While there is no way to immediately solve all the problems associated with wireless connectivity, there are applications that can make things better -- and many of them are free. I've rounded up nine free pieces of Windows software that can go a long way toward helping you solve your Wi-Fi issues at home, in your office or on the go.To read this article in full or to leave a comment, please click here

You’ve been hit with ransomware. Now what?

Imagine waking up to an urgent 5 a.m. call: Something has taken over your corporate network and encrypted all of your data, and supposedly the only way to get it all back is to pay a significant sum to an anonymous third party using Bitcoin. While that scene might sound like something out of Hollywood, it is actually very real – and it’s exactly what several variants of ransomware are doing to organizations around the globe.Two recent appearances of ransomware in the news demonstrate that it is a problem that is growing in both volume and significance, as larger and larger organizations, some critical to public and social services, are impacted by an outbreak:To read this article in full or to leave a comment, please click here

You’ve been hit with ransomware. Now what?

Imagine waking up to an urgent 5 a.m. call: Something has taken over your corporate network and encrypted all of your data, and supposedly the only way to get it all back is to pay a significant sum to an anonymous third party using Bitcoin. While that scene might sound like something out of Hollywood, it is actually very real – and it’s exactly what several variants of ransomware are doing to organizations around the globe.Two recent appearances of ransomware in the news demonstrate that it is a problem that is growing in both volume and significance, as larger and larger organizations, some critical to public and social services, are impacted by an outbreak:To read this article in full or to leave a comment, please click here

IT salaries increase across 12 tech job categories

Salaries increase across 12 tech job categoriesImage by ThinkstockMondo's 2016-2017 IT Salary Guide points to steady increases in tech salaries across 12 verticals. The study points out that as technology influences every industry, the demand for STEM workers is only going to increase, with a projected 1.5 million open positions in STEM by the year 2020. If you are already in the technology field, or are hoping to break into it, it couldn't be a better time. Mondo tracks the salaries of popular technology jobs to see how the annual compensation range increases year over year and this most recent report shows increases in nearly every tech job evaluated; and for jobs that didn't increase in this report, they at least didn't show a decline in average salary either. DevOps/SDNImage by ThinkstockTo read this article in full or to leave a comment, please click here

This tool can block ransomware on Mac OS X, for now

A security researcher has created a free security tool that can detect attempts by ransomware programs to encrypt files on users' Macs and then block them before they do a lot of damage.Called RansomWhere? the application is the creation of Patrick Wardle, director of research and development at security firm Synack. It's meant to detect and block the encryption of files by untrusted processes.The tool monitors users' home directories and detects when encrypted files are rapidly created inside them -- a telltale sign of ransomware activity.When such activity is detected, RansomWhere? determines the process responsible and suspends it. To limit false positives -- legitimate encryption programs being detected as ransomware -- the tool whitelists all applications signed by Apple and most of those that already exist on the computer when RansomWhere? is first installed.To read this article in full or to leave a comment, please click here

This tool can block ransomware on Mac OS X, for now

A security researcher has created a free security tool that can detect attempts by ransomware programs to encrypt files on users' Macs and then block them before they do a lot of damage.Called RansomWhere? the application is the creation of Patrick Wardle, director of research and development at security firm Synack. It's meant to detect and block the encryption of files by untrusted processes.The tool monitors users' home directories and detects when encrypted files are rapidly created inside them -- a telltale sign of ransomware activity.When such activity is detected, RansomWhere? determines the process responsible and suspends it. To limit false positives -- legitimate encryption programs being detected as ransomware -- the tool whitelists all applications signed by Apple and most of those that already exist on the computer when RansomWhere? is first installed.To read this article in full or to leave a comment, please click here

Jenkins as system job scheduler

Jenkins is an open software tool, typically used for continuous integration in software development. Network or system changes can be treated in a similar way as code changes are: developed, tested and deployed. Test frameworks are coming  to Network world (look at TODD) but are not popular yet.  Even without unit tests we can still use developer tools like Jenkins […]

The post Jenkins as system job scheduler appeared first on Packet Pushers.

Jenkins as system job scheduler

Jenkins is an open software tool, typically used for continuous integration in software development. Network or system changes can be treated in a similar way as code changes are: developed, tested and deployed. Test frameworks are coming  to Network world (look at TODD) but are not popular yet.  Even without unit tests we can still use developer tools like Jenkins […]

The post Jenkins as system job scheduler appeared first on Packet Pushers.

Enhanced Disaster Recovery with Cross-VC NSX and SRM

Check-out the new Disaster Recovery with NSX and SRM white paper that explains how Cross-VC NSX + VMware’s SRM offers an Enhanced Disaster Recovery (DR) solution and solves many of the challenges related to traditional DR solutions. This solution provides consistent logical networking and security across protected and recovery sites and faster recovery upon disaster scenarios. A summary and overview of the solution is provided below.  Continue reading

SpyEye botnet kit developer sentenced to long jail term

Aleksandr Andreevich Panin, the Russian developer of the SpyEye botnet creation kit, and an associate were on Wednesday sentenced to prison terms by a court in Atlanta, Georgia, for their role in developing and distributing malware that is said to have caused millions of dollars in losses to the financial sector.Panin, who set out to develop SpyEye as a successor to the Zeus malware that affected financial institutions since 2009, was sentenced by the court to nine and half years in prison, while his Algerian associate Hamza Bendelladj got a 15-year term, according to the Department of Justice.After infecting victims' computers, cybercriminals were able to remotely control these compromised computers through command-and-control servers, and steal the victims’ personal and financial information using techniques such as Web injects that introduce malicious code into a victim’s browser, keystroke loggers that record keyboard activity and credit card grabbers. The information sent to the servers was then used to steal money from the financial accounts of the victims.To read this article in full or to leave a comment, please click here

SpyEye botnet kit developer sentenced to long jail term

Aleksandr Andreevich Panin, the Russian developer of the SpyEye botnet creation kit, and an associate were on Wednesday sentenced to prison terms by a court in Atlanta, Georgia, for their role in developing and distributing malware that is said to have caused millions of dollars in losses to the financial sector.Panin, who set out to develop SpyEye as a successor to the Zeus malware that affected financial institutions since 2009, was sentenced by the court to nine and half years in prison, while his Algerian associate Hamza Bendelladj got a 15-year term, according to the Department of Justice.After infecting victims' computers, cybercriminals were able to remotely control these compromised computers through command-and-control servers, and steal the victims’ personal and financial information using techniques such as Web injects that introduce malicious code into a victim’s browser, keystroke loggers that record keyboard activity and credit card grabbers. The information sent to the servers was then used to steal money from the financial accounts of the victims.To read this article in full or to leave a comment, please click here

Apple running a secret car design lab in Germany, report claims

Rumors of Apple's interest in developing an electric car have persisted for months now. Over the last 12 months, we've heard rumblings that Apple's car development team is almost 1,000 engineers and researchers deep. What's more, it's no secret that Apple has poached a number of employees from high-end luxury automakers such as BMW, Porsche, and of course Tesla.Now whether or not an Apple Car actually sees the light of day is another matter altogether, but it's impossible to ignore that Apple is seriously exploring such a possibility. The latest report about Apple's car plans comes to us courtesy of the German-language Frankfurter Allgemeine Zeitung (F.A.Z) which relays that Apple has a secret auto-oriented research facility in Germany where a team of 15-20 employees with deep experience across all facets of the car design and manufacturing process come up with new and interesting ideas. Specifically, the employees are said to be "progressive thinkers" with backgrounds in engineering, software and hardware design, and sales.To read this article in full or to leave a comment, please click here

Leveraging IXP Colocation as an Enterprise

Providing a comprehensive solution for global connectivity is still not a trivial task. As most global enterprises know, the scale both geographically and organizationally can kill almost any well engineered network design.  Size and complexity aside, just designing for the next “XaaS” solution and cloud sprawl can greatly challenge most network engineers One approach to […]

The post Leveraging IXP Colocation as an Enterprise appeared first on Packet Pushers.

Leveraging IXP Colocation as an Enterprise

Providing a comprehensive solution for global connectivity is still not a trivial task. As most global enterprises know, the scale both geographically and organizationally can kill almost any well engineered network design.  Size and complexity aside, just designing for the next “XaaS” solution and cloud sprawl can greatly challenge most network engineers One approach to […]

The post Leveraging IXP Colocation as an Enterprise appeared first on Packet Pushers.

Making a docker container for a Flask application

Recently I presented to you a project called PLAZA which basically serves as a Web UI for python scripts. It was a pleasure to see that this project was welcomed well and some folks even asked how they can get PLAZA to play with. My fault, I wanted to release it so bad that I missed

Using OpenSwitch Appliance With GNS3

Note: This article was originally published here.

Update:This post has been updated to account for some recent changes in the appliance configuration (support for up to 7 front ports). In my previous post I described my developer setup to work with OpenSwitch. At the end of my post I showed how to download the build system, and configure and build an ‘appliance’ image.

What Is An OpenSwitch Appliance?

The appliance is a virtual machine image (in OVA format) that could be run on VirtualBox or VMware (on this articule I will focus on VirtualBox) and provides a software datapath (based in OVS right now, but P4 support it’s landing soon). All the rest of the OpenSwitch stack is the same that you will see in a real hardware, and obviously the software datapath has certain limitations and features not implemented.

Despite his limitations, the appliance is a really nice way to get your hands into OpenSwitch without having real hardware.

If you are using the development environment, you can find the appliance .ova file on the images directory after completing the build, but otherwise you can also download a periodic image from the project archives (keep in mind Continue reading