Just a short post to let you know this blog is not dead. I have not written anything in several months. While I have several posts that are partially complete, I have not been able to finish them…..yet.
For the past several months, I have been busy studying for the CCIE Wireless lab exam. Prior to that, I was sort of working towards the CCIE Route/Switch written and lab exam. I wasn’t fully committed, so my studying was sporadic at best. My heart just wasn’t in forcing myself to learn more about IPv6, multicast, MPLS, and some of the other blueprint items.
Somewhere along the line it changed. Maybe it was having another co-worker who was serious in his pursuit of the CCIE Wireless. Maybe it was that my job working for a reseller had me doing more and more Cisco wireless work. Maybe I just liked the fact that wireless was hard. I’m not really sure. I just know that at some point, a switch flipped inside my head and I just decided to go all in on my studies. Honestly, I should have done this years ago, but the timing just didn’t seem right.
I’ve been studying Continue reading
Mellanox could broaden its data center ambitions with EZchip — and inherit customer deals with Cisco and Juniper.
DataTorrent looks to improve Big Data processing and make adoption of Hadoop easier.
Illumio's ASP aims to cover all environments — which of course must include Docker containers.
Datiphy monitors database transactions to look for potentially malicious behavior. It builds a baseline of normal activity, and alerts if it detects deviations.
The post Startup Radar: Datiphy Watches For Database Dangers appeared first on Packet Pushers.
CENX answers post-webinar questions on data services delivery and full services lifecycle orchestration through lifecycle services orchestration (LSO).
AT&T spells out some specific vendor contributions, including vCPEs and virtual routers.
The startup uses public clouds and virtual routers to speed Internet traffic.
Found this link very useful doing this:
http://www.herongyang.com/Cryptography/OpenSSL-Certificate-Path-Validation-Tests.html
Some useful commands:
Display a certificate:
openssl x509 -in test-cert-top.pem -noout -text
Display a certificate's issuer:
openssl x509 -in test-cert-top.pem -noout -issuer
Display a certificate's subject:
openssl x509 -in test-cert-top.pem -noout -subject
Verify a certificate:
openssl verify test-cert-top.pem
Verify a certificate chain with 3 certificates:
openssl verify -CAfile test-cert-bottom.pem -untrusted test-cert-middle.pem test-cert-top.pem
-CAfile keyword indicates which certificate is used as the root certificate, with the -untrusted option being set to validate the intermediate certificate in the chain
Verify a certificate chain with 2 certificates:
openssl verify -CAfile test-cert-bottom.pem test-cert-middle.pem