That VPN may not be as secure as you think

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.To read this article in full, please click here

That VPN may not be as secure as you think

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.To read this article in full, please click here

That VPN may not be as secure as you think

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.To read this article in full, please click here

History Of Networking – The Internet – Dave Farber

Dave Farber was a significant contributor to many early networking technologies that developed into the Internet that we know today. In this History of Networking episode we sit down to talk with Dave about his many contributions to computer networking.

Dave Farber
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – The Internet – Dave Farber appeared first on Network Collective.

Tech Field Day in Barcelona

I was in Barcelona last week, there was a Cisco Live as you might know. During the Cisco Live unfortunately I couldn’t meet with people as I was invited them by Tech Field Day and recorded many great sessions together.   Cisco announced ACI in Cloud and there was presentations about it. If you don’t …

The post Tech Field Day in Barcelona appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Sitting in the Linux cockpit

If you haven't tried the relatively new Linux Cockpit, you might be surprised by all it can do. It's a user-friendly web-based console that provides some very easy ways to administer Linux systems — through the web. You can monitor system resources, add or remove accounts, monitor system usage, shut down the system and perform quite a few other tasks — all through a very accessible web connection. It's also very easy to set up and use.While many Linux sysadmins spend most of their time on the command line, access to a remote system using a tool like PuTTY doesn't always provide the most useful command output. Linux Cockpit provides graphs and easy-to-use forms for viewing performance measures and making changes to your systems.To read this article in full, please click here

Sitting in the Linux Cockpit

If you haven't tried the relatively new Linux Cockpit, you might be surprised by all it can do. It's a user-friendly web-based console that provides some very easy ways to administer Linux systems — through the web. You can monitor system resources, add or remove accounts, monitor system usage, shut down the system and perform quite a few other tasks — all through a very accessible web connection. It's also very easy to set up and use.While many Linux sysadmins spend most of their time on the command line, access to a remote system using a tool like PuTTY doesn't always provide the most useful command output. Linux Cockpit provides graphs and easy-to-use forms for viewing performance measures and making changes to your systems.To read this article in full, please click here

Lentiq combines data lakes with edge computing

It’s a common tactic to combine two technologies for synergy sake, but Lentiq really has a unique idea. It is combining the concept of the data lake with edge computing into what it calls “interconnected micro data lakes,” or data pools.“Data pools” are micro-data lakes that function like a data lake while supporting popular apps such as Apache Spark, Apache Kafka, and Streamsets software, or “everything a data scientist or data engineer needs,” according to the company.The data pools exist independently across different clouds, and governance rules are enforced only when the data moves, so each department will have the tools needed for their use cases and access to the data they need.To read this article in full, please click here

Lentiq combines data lakes with edge computing

It’s a common tactic to combine two technologies for synergy sake, but Lentiq really has a unique idea. It is combining the concept of the data lake with edge computing into what it calls “interconnected micro data lakes,” or data pools.“Data pools” are micro-data lakes that function like a data lake while supporting popular apps such as Apache Spark, Apache Kafka, and Streamsets software, or “everything a data scientist or data engineer needs,” according to the company.The data pools exist independently across different clouds, and governance rules are enforced only when the data moves, so each department will have the tools needed for their use cases and access to the data they need.To read this article in full, please click here

Datanauts 158: Creating, Operating, And Collaborating On Open Source

Today's Datanauts examines the successful open source project dbatools to better understand its intent, how the project is operated, and how folks collaborate across a wide spectrum to build something magnificent and open. Our guests are Chrissy LeMaire and Rob Sewell.

The post Datanauts 158: Creating, Operating, And Collaborating On Open Source appeared first on Packet Pushers.