Archive

Category Archives for "Networking"

Google tightens restrictions on Chrome extensions

Google will require most extensions for its Chrome browser to be installed from its Web Store, a move intended to stop users from inadvertently installing malicious ones.Google has gradually been changing its policy around extensions to prevent abuse. Last year, it mandated that all Chrome extensions for Windows be hosted in its store, wrote Jake Leichtling, an extensions platform product manager.The change caused a 75 percent drop in requests from customers asking how to uninstall unwanted extensions, he wrote. It did not apply to the Windows developer channel, but hackers are now using that in order to install extensions, he wrote. Starting Wednesday, all extensions for Windows will have to be hosted in the store, and the same will apply to OS X in July.To read this article in full or to leave a comment, please click here

A feisty John Chambers bows out on his final Cisco earnings call

John Chambers got a little feisty and a little sentimental in his last earnings call as Cisco’s CEO on Wednesday, dismissing a criticism of the company as “garbage” and saying he hopes to be working half time by the fall because “the hunting season’s coming up.”“It’s been fun, it’s been challenging, and I’m very humbled by having this chance for 20 years,” he said.Cisco said last week that Chambers will be replaced as CEO in July by Chuck Robbins. He’ll stay on as executive chairman of the board.“Let me first say very crisply: Chuck is the CEO. Period. He’ll make the decisions,” Chambers said. He’ll be an advisor to Robbins and be involved “where he wants me to be.”To read this article in full or to leave a comment, please click here

CloudFlare Supports the Passage of the USA Freedom Act

alt

Earlier today, the lower house in the U.S. Congress (the House of Representatives) passed the USA FREEDOM Act. The Act, if passed by the Senate and signed by the President, would seek to sunset the National Security Agency’s bulk collection and mass surveillance programs, which may or may not be authorized by Section 215 of the PATRIOT Act. Under this authority the U.S. government has established its broad surveillance programs to indiscriminately collect information. Other governments have followed this lead to create additional surveillance capabilities—most recently, the French Parliament has moved a bill that would allow broad surveillance powers with little judicial oversight.

Restricting routine bulk collection is important: it’s not the government’s job to collect everything that passes over the Internet. The new version of the USA FREEDOM Act keeps useful authorities but ends bulk collection of private data under the PATRIOT Act. It also increases the transparency of the secret FISA court, which reviews surveillance programs—a key start to understanding and fixing broken policies around surveillance. The Act would also allow companies to be more transparent in their reporting related to FISA orders.

To be clear, we continue to be supportive of law enforcement and work Continue reading

House votes to narrow NSA’s phone records collection

The U.S. House of Representatives has voted to rein in the National Security Agency’s bulk collection of the country’s telephone records, while allowing the agency to engage in more targeted surveillance.The House voted 338-88 late Wednesday to approve the USA Freedom Act, a bill intended to end the NSA’s mass collection of telephone metadata within the U.S. But the bill would extend an expiring provision in the anti-terrorism Patriot Act that allows the NSA to collect U.S. telephone and business records, but with a more limited scope.To read this article in full or to leave a comment, please click here

House votes to narrow NSA’s phone records collection

The U.S. House of Representatives has voted to rein in the National Security Agency’s bulk collection of the country’s telephone records, while allowing the agency to engage in more targeted surveillance.The House voted 338-88 late Wednesday to approve the USA Freedom Act, a bill intended to end the NSA’s mass collection of telephone metadata within the U.S. But the bill would extend an expiring provision in the anti-terrorism Patriot Act that allows the NSA to collect U.S. telephone and business records, but with a more limited scope.To read this article in full or to leave a comment, please click here

HP’s PC group cranks up design, gaming efforts ahead of spin-off

HP’s PC group doesn’t want to be a “screwdriver” PC maker making look-alike laptops and desktops, and it is focusing heavily on design and new innovations as it prepares for a spin-off into a separate company.The company is focusing on cutting the plastic and adding metal and new colors to the chassis of its laptops and desktops. HP also is expanding its hardware options for consumers, businesses and gamers, and focusing on a future when virtual reality will be an important part of the computing experience.PC makers need to update the devices because customers are paying more attention to how devices look and function, said Mike Nash, vice president for consumer PC and solutions at HP’s Printing and Personal Systems Group.To read this article in full or to leave a comment, please click here

How China’s smartphone market is evolving

The Chinese mobile market has long been described as the ultimate prize for smartphone handset makers and app developers. China has the most people, income is rising, and the population has an insatiable appetite for mobile technology.That's all true, except when the facts don't quite support the narrative.For example, the conventional wisdom holds that most Chinese mobile consumers are interested in inexpensive phones from upstart manufacturers like Xiaomi, Huawei, and ZTE. And that's true, up to a point. According to IDC's latest Mobile Phone Tracker, many of those brands are trying to move up into the mid- and high-end segments.To read this article in full or to leave a comment, please click here

Critical VM escape vulnerability impacts business systems, data centers

A critical vulnerability in code used by several virtualization platforms can put business information stored in data centers at risk of compromise.The flaw, dubbed Venom but tracked as CVE-2015-3456, can allow an attacker to break out from the confines of a virtual machine (VM) and execute code on the host system.This security boundary is critical in protecting the confidentiality of data in data centers, where virtualization is extensively used to allow different tenants to run servers on the same physical hardware.The flaw is located in the virtual Floppy Disk Controller (FDC) code from the QEMU open source machine emulator and virtualizer. The code is also used by the Xen, KVM and other virtualization platforms.To read this article in full or to leave a comment, please click here

Nuage visualizes the SDN

Nuage Networks this week released an application designed to better integrate physical and virtual networks.The company’s Virtualized Services Assurance Platform (VSAP) correlates the operation of virtual overlays and physical underlays in software defined networks on behalf of applications and workloads. Nuage says it employs standard protocols to achieve this instead of proprietary approaches offered by its SDN competitors that require specific hardware.+MORE ON NETWORK WORLD: Alcatel-Lucent SDN company puts pedal to bare metal+To read this article in full or to leave a comment, please click here

Nuage visualizes the SDN

Nuage Networks this week released an application designed to better integrate physical and virtual networks.The company’s Virtualized Services Assurance Platform (VSAP) correlates the operation of virtual overlays and physical underlays in software defined networks on behalf of applications and workloads. Nuage says it employs standard protocols to achieve this instead of proprietary approaches offered by its SDN competitors that require specific hardware.+MORE ON NETWORK WORLD: Alcatel-Lucent SDN company puts pedal to bare metal+To read this article in full or to leave a comment, please click here

Establishing your virtual presence on the cheap

I was excited to see what Double Robotics has accomplished with their telepresence robot, especially when one showed up on an episode of The Good Wife. Double Robotics’ device (see http://www.doublerobotics.com/) is making it possible for teleworkers to have their “doubles” moving around the office, chatting with staff, and attending meetings. The devices works like an iPad on a Segway, though the stand/roller part of the setup is much lighter and slimmer than a Segway, so it’s more like an iPad on a rolling stick. But the movement is controlled remotely and the person controlling it has a sense from their screen of moving around the office and interacting with the staff because their “double” really is.To read this article in full or to leave a comment, please click here

Public Key Authentication on Cisco IOS

Have you ever been in that situation that you needed to apply the same configuration quickly on multiple Cisco routers? If yes, you probably wrote a script that connected to routers and sent appropriate IOS commands. One problem that you certainly had to solved was forcing your script to enter login credentials such as username and password. Moreover if you secure an access to privileged user mode of routers with an enable secret command you had to tell the script how to enter that password as well.

All the issues I have mentioned above can be easily solved with Expect scripting language. Expect sends commands via telnet or ssh session as the human would. However encapsulating IOS commands to syntax recognized by Expect language every time you need to change routers' configuration seems to be not very comfortable. That is why public key authentication for Cisco routers can be handy.

Public key authentication allows you to log in to your routers using  RSA key instead of a password. But firstly  key-pair - public and private key must be generated and a public key copied into a config file of  the router. Then you can connect to the router with your  private key. A private key is the key that should Continue reading

How much you really need to worry about SSD reliability

The word is out: Your SSD won’t retain your data forever when you unplug it. Yup, you’ll never be able to go on vacation again without toting your SSD along. It’s incapable of surviving for two weeks without you, poor thing.I kid, of course.Not archival, but not pathetic The truth is, yes, under disastrously unfortunate environmental conditions (we’re talking Biblical), your SSD could lose data retention just a few days after it’s pulled from your PC. It could also lose it immediately if you pulverized it with a sledgehammer or threw it in a vat of sulphuric acid—almost-as-likely scenarios. To the point: I’ve re-tasked SSDs after a couple of years of sitting on the shelf, and annoyingly—I still had to secure-erase them to get rid of the old data.To read this article in full or to leave a comment, please click here