Archive

Category Archives for "Networking"

How to hack your own Wi-Fi network

One way to bolster your understanding of Wi-Fi security is to do some hacking yourself. That doesn’t mean you should infiltrate a company’s network or snoop on a neighbor’s setup. Rather, ethical hacking and legitimate Wi-Fi penetration testing – done in cooperation with the network owner – can help you learn more about the strengths and limitations of wireless security. Understanding potential Wi-Fi vulnerabilities can help you to better protect the networks you manage and ensure safer connections when you access other wireless networks.Start with a Wi-Fi stumbler General purpose Wi-Fi stumblers are the simplest and most innocent tools to add to your pen testing kit. Though typically passive tools, they serve an important purpose. They allow you to see what access points (AP) are nearby and their details, such as the signal level, security/encryption type, and media access control (MAC) address. It’s a tool even a hacker would utilize to find the next victim.To read this article in full, please click here

Network Neighborhood – Meet Denise “Fish” Fishburne

Denise "Fish" Fishburne chats with Ethan Banks. The conversation covers being arrested at 19 for DUI, being gay in the corporate world of the 80's and 90's, overcoming the challenge of being easily bored, teaching without ego, struggling with a distrust of others, the myth of the self-made person, and becoming an active member of the "Network Neighborhood."

For Denise, it's all about community. "All for one, and one for all."

Want more Fish?
https://networkingwithfish.com
https://twitter.com/denisefishburne
https://www.linkedin.com/in/denise-fishburne-b50b7277/

The post Network Neighborhood – Meet Denise “Fish” Fishburne appeared first on Packet Pushers.

Network Neighborhood – Meet Denise “Fish” Fishburne

Denise "Fish" Fishburne chats with Ethan Banks. The conversation covers being arrested at 19 for DUI, being gay in the corporate world of the 80's and 90's, overcoming the challenge of being easily bored, teaching without ego, struggling with a distrust of others, the myth of the self-made person, and becoming an active member of the "Network Neighborhood." For Denise, it's all about community. "All for one, and one for all." Want more Fish? https://networkingwithfish.com https://twitter.com/denisefishburne https://www.linkedin.com/in/denise-fishburne-b50b7277/

Try out this powerful online meeting solution for free

The conundrum of business meetings: as much as they allow for dispersed teams to connect and hammer out issues and propose solutions in real-time, it can be equally difficult to find an easy-to-use solution that works for everyone. We’ve all been there: getting booted off a call, only to find it impossible to join later, or dealing with frustrating limits to the number of people who can join the conference — the list of issues goes on. Now is the time to get an easy-to-use online meeting solution that’s made to scale for businesses of all types: RingCentral Meetings™. To read this article in full, please click here

BrandPost: Top 4 Edge Computing Challenges that IT Solution Providers Can Solve

The global edge computing market size is projected to reach $3.24 billion US by 2025 (according to a study conducted by Grand View Research, Inc.). While this research underscores the speed and volume at which edge computing installations are growing, it masks the idea that many organizations still consider themselves in the early adoption phases of this technology. Before companies plan the move to widespread rollouts, they are seeking answers to significant deployment questions.To read this article in full, please click here

Tips for using the Ip command to print from Linux systems

The lp command on Linux systems offers a range of printing options that allow you to print documents using a variety of options. In this post, we take a look at some that offer interesting possibilities.The recent Printing from the Linux command line post covers printing in double-sided and portrait mode. In this post, we'll look at printing: Multiple pages per sheet Specific pages or page ranges Pages with borders Multiple copies [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] How to print multiple pages per sheet With lp, you can print as many as 16 pages of a document on one side of a single sheet of paper. To specify the number of pages to print on a page, use the  lp -o number-up=# command (e.g.,  lp -o number-up=16 mydoc). If your document doesn't contain as many pages as you've requested in the layout, that's OK. The page will simply have an empty area.To read this article in full, please click here

BrandPost: Digital Transformation Update: Challenges & the Road Ahead

Fast, faster, fastest. The pace for digital transformation has escalated such that, if your company hasn’t started, it will be left behind in a legacy bubble, according to participants in a recent IDG TechTalk Twitter chat. A1) I hate to be mean-spirited, but #DigitalDarwinism will take hold at some point if it hasn't already. Regardless of whether your org has been disrupted, your org's sector is a red ocean, or they're just not getting it; the time for lagging is over. #idgtechtalkTo read this article in full, please click here

Tech Bytes: Nubeva Enhances Cloud Packet Broker With New Processing Capabilities (Sponsored)

Today's Tech Bytes episode explores new features in sponsor Nubeva's cloud packet broker, including packet processing capabilities, integration with open-source tools such as ntop and Zeek, and its ability to work with cloud-native taps such as Azure VTAPs.

The post Tech Bytes: Nubeva Enhances Cloud Packet Broker With New Processing Capabilities (Sponsored) appeared first on Packet Pushers.

Grey Failure Lessons Learne

Grey Failures in the Real World

Most “smaller scale” operators probably believe they are not impacted by grey failures, but this is probably not true. Given the law of large numbers, there must be some number of grey failures in some percentage of smaller networks simply because there are so many of them. What is interesting about grey failures is there is so little study in this area; since these errors can exist in a network for years without being discovered, they are difficult to track down and repair, and they are often “fixed” by someone randomly doing things in surrounding systems that end up performing an “unintentional repair” (for instance by resetting some software state through a reboot). It is interesting, then, to see a group of operators collating the grey failures they have seen across a number of larger scale networks.

Gunawi, Haryadi S., Riza O. Suminto, Russell Sears, Casey Golliher, Swaminathan Sundararaman, Xing Lin, Tim Emami, et al. “Fail-Slow at Scale: Evidence of Hardware Performance Faults in Large Production Systems,” 1–14, 2018. https://www.usenix.org/conference/fast18/presentation/gunawi.

Some interesting results of the compilation are covered in a table early in the document. One of these is that grey Continue reading

Network Break 227: Facebook’s Plaintext Password Blunder; How Google’s Gaming Service Might Impact Broadband

Today's Network Break looks at Facebook's plaintext password blunder, Nokia's new investment in the IETF, the potential impact of Google's gaming service on broadband, new products from VMware and Dell EMC, and more tech news.

The post Network Break 227: Facebook’s Plaintext Password Blunder; How Google’s Gaming Service Might Impact Broadband appeared first on Packet Pushers.

The Week in Internet News: Russia Moves Toward Test of Internet Disconnect

A separate Internet: The MIT Technology Review looks at the implications of Russia’s test to cut itself off from the rest of the Internet, scheduled for early April. The shutdown is a test of an Internet sovereignty law being considered in Russia, but it’s unclear how the country will actually accomplish the disconnect.

Clamping down: Egypt is cracking down on fake news with new rules that critics say are meant to curb dissent and restrict information the government believe is a threat to national security, The Hill reports. The country’s Supreme Media Regulatory Council can now block websites and some social media accounts with more than 5,000 followers for what it believes is “fake news” and can fine operators up to US$14,400 without getting a court order. Meanwhile, Russian President Vladimir Putin has signed two bills that critics say amount to censorship, Ars Technica says. One bill allows stiff fines for disseminating what the government determines is fake news, and the second allows fines and jail time for insulting government officials, including Putin.

Encrypting the IoT: The U.S. National Institute of Standards and Technology is looking at encryption methods to protect the Internet of Things and other computing devices against future encryption-cracking technologies, Continue reading

IT needs to make mobile unified communications a priority

The need for safe, reliable, and easy-to-use communications tools has given rise to unified communications (UC), a strategy that integrates multiple communications modalities under a single management and security umbrella. The result is more effective communication, improved collaboration, and a boost to security and regulatory policies. Now that mobility is the primary networking vehicle for end users, it’s time for IT departments to make mobile unified communications (MUC) a priority.The most important benefit of MUC is the ability of organizations to finally leave behind the uncontrolled, untracked mish-mash of consumer-centric, carrier, and third-party communications tools traditionally applied over the years. Communications are a critical organizational resource; MUC is a much easier vehicle to manage and scale, and MUC offers the visibility and control that’s essential to enterprise IT deployments. These advantages will enable MUC to become the dominant provisioning strategy and mechanism for organizational communications over the next five to 10 years.To read this article in full, please click here

Last Week on ipSpace.net (2019W12)

Spring started for real, so it was time for some early-spring cleaning and I managed to complete two webinars during last week:

Both webinars are part of standard ipSpace.net subscription