Archive

Category Archives for "Networking"

New products of the week 07.20.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Proficio ProSOC ExpressKey features: ProSOC Express provides SMBs with 24x7 enterprise-class security monitoring and alerting services. Offered as a highly affordable SaaS subscription service, it includes the same advanced SIEM technology and 24x7 expert monitoring that Proficio provides to its enterprise customers. More info.To read this article in full or to leave a comment, please click here

REVIEW: Email encryption has gotten so much better, so you’d be crazy not to use it

I once co-wrote a book on enterprise email where I likened email encryption to a “sucking chest wound.” That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least. While things have improved considerably since then, encrypting messages is not as simple as it could be, and requires careful study if you want to have truly private communications that can’t be viewed by your competitors – or your government. In the past, recipients of encrypted emails had to share the same system as the sender, and many email clients were difficult to configure. Today, many products have a “zero knowledge encryption” feature, which means you can send an encrypted message to someone who isn’t on your chosen encryption service. Just provide them a passphrase to decrypt their message and to compose a reply to you, or in some cases they can read the message by just authenticating themselves. After this first communication, your recipient is able to exchange encrypted messages with you quite easily.To read this article in full or to leave a comment, please click here(Insider Story)

Best tools for email encryption

Email encryptionRecipients of encrypted emails once had to share the same system as the sender. Today, products have a “zero knowledge encryption” feature, which means you can send an encrypted message to someone who isn’t on your chosen encryption service. Today’s products make sending and receiving messages easier, with advances like an Outlook or browser plug-in that gives you nearly one-button encryption. And the products we reviewed have features like setting expiration dates, being able to revoke unread messages or prevent them from being forwarded. (Read the full review.)To read this article in full or to leave a comment, please click here

Review: Best tools for email encryption

Email encryptionRecipients of encrypted emails once had to share the same system as the sender. Today, products have a “zero knowledge encryption” feature, which means you can send an encrypted message to someone who isn’t on your chosen encryption service. Today’s products make sending and receiving messages easier, with advances like an Outlook or browser plug-in that gives you nearly one-button encryption. And the products we reviewed have features like setting expiration dates, being able to revoke unread messages or prevent them from being forwarded. (Read the full review.)To read this article in full or to leave a comment, please click here

Yet Another blog about Segment Routing -Part2 : TI-LFA

So finally got some time after a while to write something. In this post we will be looking at Topology Independent LFA aka TI-LFA. We will also compare TI-LFA with LFA, rLFA and TE-FRR. If you don’t already have familiarity with LFA’s or TE-FRR then take a look at my previous posts on TE design […]

Author information

Diptanshu Singh

Diptanshu Singh

Diptanshu Singh,(3xCCIE,CCDE) is a Sr. Engineer mostly focused on service providers , data center and security. He is a network enthusiast passionate about network technologies so not only is it his profession, but something of a hobby as well.

The post Yet Another blog about Segment Routing -Part2 : TI-LFA appeared first on Packet Pushers Podcast and was written by Diptanshu Singh.

Docker Experimental Networking – 1

Networking support in Docker was primitive till now. Single host connectivity was through Linux bridge and there was no native mechanism to connect Containers across hosts. With Pipework, we could do a hacky approach to connect Containers across hosts. Companies like Socketplane, Weave have been working to address this Networking gap. I have written multiple … Continue reading Docker Experimental Networking – 1

Docker Experimental Networking – 1

Networking support in Docker was primitive till now. Single host connectivity was through Linux bridge and there was no native mechanism to connect Containers across hosts. With Pipework, we could do a hacky approach to connect Containers across hosts. Companies like Socketplane, Weave have been working to address this Networking gap. I have written multiple … Continue reading Docker Experimental Networking – 1

Boeing subsidiary wants to use drones to infect PCs with Hacking Team spyware

After attending IDEX 2015 (International Defense Exhibition), Boeing subsidiary Insitu become interested in using its surveillance drones to deliver Hacking Team malware for even more surveillance.In April, an Insitu mechanical engineer intern sent an email to the Hacking Team which stated: We see potential in integrating your Wi-Fi hacking capability into an airborne system and would be interested in starting a conversation with one of your engineers to go over, in more depth, the payload capabilities including the detailed size, weight, and power specs of your Galileo System.To read this article in full or to leave a comment, please click here

MikroTik CCR1072-1G-8S+ Review (Part 2) – BGP Performance *** Preview ***

Part 2 is on the way!

It has been a busy week and we have been working hard on CCR1072 testing. The full review for BGP Performance is still a few days away, but here is a sneak preview of some of the testing in the IP ArchiTechs Area 51 Lab.

We put just under 1.7 Million routes across 4 BGP peers into the CCR1072-1G-8S+ and it was fully converged in 2 Minutes and 42 seconds.

Here is a screen shot of the CCR1072-1G-8S+ after converging with 4 full feeds. 

CC1072-BGP-Peering-Preview

Self-Control

"

Even a person on a diet who sensibly avoids coming face-to-face with a piece of chocolate cake will find it hard to control himself if the chocolate cake somehow finds him. Every pastry chef in America understands this, and now neuroscience does, too. … We cannot think down the road when we are faced with the chocolate cake. … We have lost the ability to self-regulate, at all levels of the society.

" Michael Lewis/Boomerang —

LinkedInTwitterGoogle+FacebookPinterest

The post Self-Control appeared first on 'net work.

Google Capital likes CrowdStrike for endpoint protection

Next-gen endpoint protection vendor CrowdStrike has landed $100 million in new investments to beef up sales and engineering and continue its push to make anti-virus software obsolete.The company will hire at least another 70 people to boost its engineering staff as well as expand its operations outside North America. The company has about 210 employees now, says CEO George Kurtz.+ ALSO ON NETWORKWORLD: Hottest network and computing startups of 2015 +The new funding pushes total investment in the company to $156 million and makes it the first security company that Google Capital has invested in. Also participating in this C Round of funding is Rackspace, Accel Partners and Warburg Pincus.To read this article in full or to leave a comment, please click here