Archive

Category Archives for "Networking"

Why you need DRM for your documents

If you pay $1.99 to download an ebook for your Kindle, it’s protected by DRM that stops you sharing the contents, and if Amazon wants to, it can revoke the document so you can’t read it any more. Is your company’s current price list protected nearly as well?With information rights management (often known as enterprise DRM, short for digital rights management), you could make sure that price list was only shared with your customers, blocking them from sending it on to your competitors and automatically blocking it at the end of the quarter when you come out with new prices. Or you could share specifications with several vendors in your supply chain during a bidding process and then block everyone but the winning vendor from opening the document after the contract is finalized. You can make sure that contractors aren’t working from out of date plans by making the old plan expire when there’s an update. Tracking and visibility is useful for compliance as well as security; you could track how many people had opened the latest version of the employee handbook, or see that a document you’d shared with a small team was being actually read by Continue reading

Why you need DRM for your documents

If you pay $1.99 to download an ebook for your Kindle, it’s protected by DRM that stops you sharing the contents, and if Amazon wants to, it can revoke the document so you can’t read it any more. Is your company’s current price list protected nearly as well?With information rights management (often known as enterprise DRM, short for digital rights management), you could make sure that price list was only shared with your customers, blocking them from sending it on to your competitors and automatically blocking it at the end of the quarter when you come out with new prices. Or you could share specifications with several vendors in your supply chain during a bidding process and then block everyone but the winning vendor from opening the document after the contract is finalized. You can make sure that contractors aren’t working from out of date plans by making the old plan expire when there’s an update. Tracking and visibility is useful for compliance as well as security; you could track how many people had opened the latest version of the employee handbook, or see that a document you’d shared with a small team was being actually read by Continue reading

That printer in the corner is still a threat

They sit off in the corner, some of them collecting dust. Yet, a printer is a legitimate attack surface. Many companies don’t bother to update the firmware on older models, or don’t include every model in a security audit (such as the one in the CEO’s office everyone forgot about), or the organization assumes a hacker won’t bother with an Epson or HP that is barely even connected to Wi-Fi.Interestingly enough, because a printer is so innocuous and seemingly harmless, that’s the exact reason it poses a threat, according to the security analysts who talked to CSO about this issue. Sometimes, the best attack vector for an attacker is the one no one bothers to think about. However, a recent IDC survey found that 35 percent of all security breaches in offices were traced back to an unsecured printer or multi-function device, costing companies $133,800 each year.To read this article in full or to leave a comment, please click here

That printer in the corner is still a threat

They sit off in the corner, some of them collecting dust. Yet, a printer is a legitimate attack surface. Many companies don’t bother to update the firmware on older models, or don’t include every model in a security audit (such as the one in the CEO’s office everyone forgot about), or the organization assumes a hacker won’t bother with an Epson or HP that is barely even connected to Wi-Fi.Interestingly enough, because a printer is so innocuous and seemingly harmless, that’s the exact reason it poses a threat, according to the security analysts who talked to CSO about this issue. Sometimes, the best attack vector for an attacker is the one no one bothers to think about. However, a recent IDC survey found that 35 percent of all security breaches in offices were traced back to an unsecured printer or multi-function device, costing companies $133,800 each year.To read this article in full or to leave a comment, please click here

Introducing CloudFlare Origin CA

Free and performant encryption to the origin for CloudFlare customers

Introducing CloudFlare Origin CA

Introducing CloudFlare Origin CA

In the fall of 2014 CloudFlare launched Universal SSL and doubled the number of sites on the Internet accessible via HTTPS. In just a few days we issued certificates protecting millions of our customers’ domains and became the easiest way to secure your website with SSL/TLS.

At the time, we "strongly recommend[ed] that site owners install a certificate on their web servers so we can encrypt traffic to the origin." This recommendation was followed by a blog post describing two readily-available options for doing so—creating a self-signed certificate and purchasing a publicly trusted certificate—and a third, still-in-beta option: using our private CA. Even though out-of-pocket costs of acquiring public CA certificates have since fallen to $0 since that post, we have continued to receive requests from our customers for an even easier (and more performant) option.

Operating a public certificate authority is difficult because you don't directly control either endpoint of the HTTPS connection (browser or web server). As a result, public CAs are limited both in their ability to issue certificates optimized for inter-server communication, as well as in their ability to revoke certificates if they are compromised. Continue reading

The IoT company behind the curtain

Greenwave Systems is sort of the BASF of Internet of Things: It doesn’t make the IoT products you buy, it makes them better. Greenwave (one of Network World’s recently named IoT Companies to Watch) provides software and services that help consumer-facing companies like Verizon deliver IoT features to their customers. IDG US Media Chief Content Officer John Gallant talked recently to Greenwave’s Chief Scientist, Jim Hunter, about how the company is empowering IoT applications and how new voice and social-media-driven capabilities will change the market. Hunter also explored the evolving IoT market and offered a candid assessment of how data ownership and security issues could hamper the IoT revolution.To read this article in full or to leave a comment, please click here

Response: Are Open-Source Controllers Ready for Carrier-Grade Services?

My beloved source of meaningless marketing messages led me to a blog post with a catchy headline: are open-source SDN controllers ready for carrier-grade services?

It turned out the whole thing was a simple marketing gig for Ixia testers, but supposedly “the response of the attendees of an SDN event was overwhelming”, which worries me… or makes me happy, because it’s easy to see plenty of fix-and-redesign work in the future.

Read more ...

Hot products at Interop 2016

Interop 2016The 30th version running this week in Las Vegas features a trade show with more than 160 vendors displaying their wares and where its interoperability mission ventures far outside the show’s signature InteropNet Demo Lab. This year it is focused on promoting interoperability among Internet of Things devices, a category of gear unheard of that first year. (See Network World's preview story of the show.)To read this article in full or to leave a comment, please click here

Hot products at Interop 2016

Interop 2016The 30th version running this week in Las Vegas features a trade show with more than 160 vendors displaying their wares and where its interoperability mission ventures far outside the show’s signature InteropNet Demo Lab. This year it is focused on promoting interoperability among Internet of Things devices, a category of gear unheard of that first year. (See Network World's preview story of the show.)To read this article in full or to leave a comment, please click here

China’s booming middle class augurs well for Apple, says Tim Cook

Apple CEO Tim Cook still sees great potential in the Chinese market despite a drop in its revenue from the country in the first quarter.In an interview to Jim Cramer of CNBC's Mad Money program, Cook said Monday that the middle class in China is expected to boom from 50 million people five years ago to almost 500 million in the next five years. “This is an unprecedented growth of the middle class,” said Cook, adding that he “could not be more optimistic about China.”To a question from Cramer, Cook said it was an error by him not to to mention the figures about the burgeoning Chinese middle class during the company’s recent earnings call.To read this article in full or to leave a comment, please click here

CiscoLive 2016: ‘Summer Camp for Geeks’

The other day I was talking with a friend about my summer plans. As we were talking about July….. my face apparently lit up and my voice got all excited and happy when I mentioned CiscoLive.

“What exactly is CiscoLive?” she asked.

I answered, “CiscoLive is my absolute favorite work week of the entire year. Has been since my first one back in 2006.”

“What do you like so much about it?” she asked.  ……

My answer to her?  ?

“It’s like a week long Summer Camp for Geeks”

july

Why I Love Cisco Live US

  1. Learning & Sharing Knowledge
    1. Breakouts, Technical Seminars, and Labs
    2. Meet the Expert
    3. Lunch and Learn (Formerly Table Topics)
  2. Social Media Fun

Learning & Sharing Knowledge

Learning… learning… learning ….. learning.   I just love learning!  For me… learning from others and passing that on is one of my passions in life.

And WOW is there knowledge to learn at CiscoLive!

Of course, I have never been to a CiscoLive as a non Cisco employee.  Nor have I ever gone and not been a speaker.  So, for me, CiscoLive has always involved me prioritizing technical knowledge sharing/teaching with CiscoLive Continue reading

Microsoft’s CEO explains why his company sued the U.S. government

Microsoft surprised the world last month when it filed a lawsuit against the U.S. Department of Justice, alleging that the frequent practice of attaching gag orders to search warrants for customer data violates the U.S. Constitution.On Monday, CEO Satya Nadella told a group of tech luminaries why the company did so: Microsoft has a strong view on its privacy promises to users, and the company will fight to prevent government overreach that, in its view, compromises the principles of privacy. Governments have a compelling need to help preserve public safety, but Microsoft wants to make sure that users' privacy is also preserved, Nadella said. To read this article in full or to leave a comment, please click here

Microsoft’s CEO explains why his company sued the U.S. government

Microsoft surprised the world last month when it filed a lawsuit against the U.S. Department of Justice, alleging that the frequent practice of attaching gag orders to search warrants for customer data violates the U.S. Constitution.On Monday, CEO Satya Nadella told a group of tech luminaries why the company did so: Microsoft has a strong view on its privacy promises to users, and the company will fight to prevent government overreach that, in its view, compromises the principles of privacy. Governments have a compelling need to help preserve public safety, but Microsoft wants to make sure that users' privacy is also preserved, Nadella said. To read this article in full or to leave a comment, please click here

Label Switched Multicast — Packet Walk

This post is going to follow a multicast packet as it moves through a sample MPLS network using Label Switched Multicast (LSM). I'll show how the packet moves through the network by looking at the forwarding tables on different routers and also by doing some packet captures.

This post is part of a series I'm writing on LSM and if you're not already familiar with LSM, I recommend you go back and read the previous posts.

After reading this post you will be able to precisely describe how LSM forwarding works in the data plane and will be able to do some basic troubleshooting.

Let's get into the lab!

Can Oracle buy its way into the cloud?

It wasn't so long ago that Oracle dismissed cloud computing as "gibberish." Today, it's singing a different tune.Through a string of acquisitions, the database giant has been buying a presence in the cloud in much the same way it built up its on-premises portfolio decades ago. What remains to be seen is whether that strategy can work as well in this new setting.Acquisitions of companies such as PeopleSoft and Siebel played a key role in fleshing out Oracle's traditional applications portfolio back in the mid-2000s, helping the company become a major player in enterprise software.To read this article in full or to leave a comment, please click here

Want to be a better engineer? Learn to troubleshoot

Want to be a better engineer? Learn to troubleshoot Since I have been working in IT for many years there are a few traits that generally separate a good engineer from a great engineer. One of those traits is troubleshooting. For those of you out there who have been doing this a long time would […]

The post Want to be a better engineer? Learn to troubleshoot appeared first on Packet Pushers.

Want to be a better engineer? Learn to troubleshoot

Want to be a better engineer? Learn to troubleshoot Since I have been working in IT for many years there are a few traits that generally separate a good engineer from a great engineer. One of those traits is troubleshooting. For those of you out there who have been doing this a long time would […]

The post Want to be a better engineer? Learn to troubleshoot appeared first on Packet Pushers.

Boston Globe publishes pictures taken by lawyer of suspect in famous art heist

The Boston Globe, whose Pulitzer-winning work behind the Oscar-honored movie “Spotlight” earned it a shout-out from President Obama this weekend, today is relying upon the photographic skills of a mobster’s attorney to illustrate a breaking news story about the FBI’s latest attempt to solve the famous Gardner Museum art heist.The photos, credited to attorney A. Ryan McGuigan, show FBI vehicles and work tents in front of the Connecticut home of McGuigan’s client. And while it is my opinion that a screen capture would represent fair use in this instance … did I mention that the photos were taken by an attorney?From the Globe story, which is behind a pay wall:To read this article in full or to leave a comment, please click here