Archive

Category Archives for "Networking"

NSA said to increase monitoring of US ‘Net traffic to catch hackers

The U.S. National Security Agency is reportedly intercepting Internet communications from U.S. residents without getting court-ordered warrants, in an effort to hunt down malicious hackers.The previously undisclosed NSA program monitors Internet traffic for data about cyberattacks originating outside the U.S., according to a New York Times article published Thursday and based on leaks from former NSA contractor Edward Snowden.President Barack Obama’s administration launched the NSA cybersecurity program without public notice or debate, according to the report.To read this article in full or to leave a comment, please click here

Open Networking for the Whole of Your Data Center Network

RMP_Landing_Page_980x270

In the past, I’ve designed, deployed and operated networks of various sizes, needs and scopes. One of the perennial design points common to all of them is how to approach the out-of-band (OOB) network. When it comes to making sure your production network operates in the face of issues, the OOB network is often a critical component. But it also raises the question of how to build it, what components to use and how much they affect the “day job” of running the production network. These decisions haven’t always been easy.

Generally, there is a spectrum of approaches.  On one end is the choice to go with the same gear that you are deploying in the production network. On the other end is the decision to just build the OOB network out of what you can get from the local or online electronics superstore.  One can cause you budget problems; the other raises the question if your OOB network will be there when you most need it.  All too often the most frugal designs win, and this can cause you to have to troubleshoot the OOB network before you can troubleshoot the production network. So the issue is more than just the initial acquisition cost, Continue reading

Yahoo does Spring Cleaning: Shuts down Maps, Pipes & more

In case you were wondering what it is exactly that Yahoo does these days, the company says its focus is on "search, communications and digital content." The rest must go, and as such, Yahoo today has announced some things it is getting rid of.For starters, the company is doing away with maps.yahoo.com (a.k.a. Yahoo Maps) at the end of June. Though maps will live on within Yahoo search and Flickr in some fashion.  "We made this decision to better align resources to Yahoo's priorities as our business has evolved since we first launched Yahoo Maps eight years ago."RELATED: 7 Things Microsoft Killed Off in 2014To read this article in full or to leave a comment, please click here

Pushing For The Next Level

Drew Conry-Murray joins the Packet Pushers as employee number 1.

Author information

Drew Conry-Murray

I'm a tech journalist, editor, and content director with 17 years' experience covering the IT industry. I'm author of the book "The Symantec Guide To Home Internet Security" and co-author of the post-apocalyptic novel "Wasteland Blues," available at Amazon.

The post Pushing For The Next Level appeared first on Packet Pushers Podcast and was written by Drew Conry-Murray.

Please take our Mobility survey

IDG Enterprise (which includes NetworkWorld, Computerworld and other news websites for IT pros) is in the process of fielding a survey with the objective of gauging strategy, challenges and drivers with regard to mobile technologies. You can expect to see articles across our publications based on the results in late summer. We invite you to take the survey and enter a drawing to win a $500 cash prize.* Tell us about your organization’s top mobile priorities, and how emerging technology is changing roles and responsibilities within your organization.To read this article in full or to leave a comment, please click here

Cisco ACI in the CNPES Cert (Engineering Specialist)

Cisco’s current network programmability certs uses two exams per cert, with the second exam focusing on ACI. That represents the first ACI-focused specialist exams from Cisco, and a great reason to learn about ACI and validate that knowledge. Today’s post looks at the ACI-focused exam for the Cisco CNPES Cert exam: the 600-512 NPENGACI exam. We’ll look at both the exam and a related video course.

Other posts in this series:

Overview

First, to set the stage, Cisco rolled out their network programmability (read: SDN) certifications over a period of months, mostly in 2014. Figure 1 shows these four certs, with the engineering specialist cert focusing on engineering and implementation.

Figure 1: Overview of Cisco SDN Certifications

 

Today’s post focuses on the second exam: the 600-512 NPENGACI exam. The name itself is a bit of a mouthful:

Network Programmability ENGineering with ACI

Basically, the NPENG 600-504 exam covers SDN implementation excluding ACI, NPENGACI 600-512 exam includes ACI.

This list provides the links for more details – for the certification, each of the two exams, and each of Cisco’s two Continue reading

Ahead of the Cisco Live curve: Avi Networks announces Cisco ACI integration

Next week Cisco holds its annual user conference, Cisco Live, in San Diego. Cisco Live is a great show for customers to get educated on the latest and greatest Cisco technology available to them and how it can fit into their environment. Another benefit of Cisco Live is that customers can find technology partners that have developed solutions that work in conjunction with Cisco solutions.One vendor that jumped the gun and announced a solution early is the application delivery controller start up Avi Networks. I actually wrote about Avi earlier this year in this blog. I'm guessing that Avi Networks wanted to get ahead of the flurry of press releases that I'm expecting next week, and I'm glad they did as this seems like a compelling solution.To read this article in full or to leave a comment, please click here

Researcher warns popular gaming plug-in puts millions of web users at risk from data thieves

A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users’ data from websites they’re logged into, such as their Web mail and social networking accounts.The technology in question, from Unity Technologies, is used by hundreds of thousands of developers to create online games and other interactive 3D content. The flaw, which the researcher says hasn’t been patched yet, is located in the Unity Web Player, a plug-in that needs to be installed inside browsers in order to display Unity-based Web apps.Unity Technologies, based in San Francisco, didn’t immediately respond to a request for comment.To read this article in full or to leave a comment, please click here

Shopping for 802.11ac Wave 2 Wi-Fi? Don’t rush into it

Cisco's new Aironet 1850 Access Point supports 802.11ac Wave 2 WiFi technology The new world of Wi-Fi is a bit like the proverbial airplane being built in mid-air: Unless you really need to enter the new world of LANs right now, it might make sense to hold off. A case in point is the first 802.11ac Wave 2 access point from Cisco Systems, introduced on Tuesday in advance of the Cisco Live conference next week.To read this article in full or to leave a comment, please click here

Cloning Remote Linux Machines

Recently, I have been asked to find a way how to clone Linux machines running in a remote virtual lab. The machines have single disks, they all are accessible over SSH and configured with the same login credentials. The goal is to make identical copies of their disks, download the disks and rebuild machines locally in the virtual lab.

On Linux based systems, utility 'dd' is very often used to make identical copy of a disk. I have used this command together with 'ssh' and 'gzip' commands to copy and compress remote disks and send them on the fly to a local disk over SSH connection. For instance, the command below issued on a local machine copies a disk /dev/sda of a remote Linux machine with IP address 10.10.10.11 to a local disk:

$ ssh [email protected] "/bin/dd if=/dev/sda | gzip -c" | dd of=disk.raw.gz

Explanation:
/dev/sda - disk located on remote machine
disk.raw.gz - gzip compressed copy of disk /dev/sda on local machine
gzip -c - send compressed file to stdout

I wrote a BASH script backup-images-1.0.sh that automates process of cloning disks of remote Linux machines. The script reads IP addresses from Continue reading

A framework to help make sense of cybersecurity tools

marcelo manjon

Marcelo Manjon

The spate of high profile cyberattacks have raised the awareness of cybersecurity to the board level and encouraged venture capitalists to pour money into this sector. In 2013 the industry received $1.7 billion of VC money across 240 deals, hitting a five-year high in both funding and number of deals, according to CB Insights. Today the cybersecurity landscape is comprised of nearly 500 companies, CB Insights says.

But many of these security tools are fragmented, and as a result it is often difficult to describe, categorize and compare various security tools given the numerous subcategories and new startups tackling one small part of the problem. In order to better understand this complex market and put into perspective the various solutions constantly coming to market, I would like to propose a framework we use at XSeed Capital to parse the market.

To read this article in full or to leave a comment, please click here

MPLS Quiz

There are 20 relatively easy MPLS questions in the below MPLS QUIZ. It should take around 30 to 45 minutes and above 50 is nice score in my opinion. Although this post is related with MPLS, you can click here for the other tests. Please specify your name and email address to receive an email for… Read More »

The post MPLS Quiz appeared first on Network Design and Architecture.