New products of the week 4.10.17

New products of the weekImage by Illusive NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.VM Backup version 7Image by altaroTo read this article in full or to leave a comment, please click here

New products of the week 4.10.17

New products of the weekImage by Illusive NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.VM Backup version 7Image by altaroTo read this article in full or to leave a comment, please click here

Linux Mint 18.1: Mostly smooth, but some sharp edges

We’ve been fond of Linux Mint for its ability to present a friendly interface to the average end user, while having a stable foundation of Debian and Ubuntu underneath. In this review, we looked at LinuxMint 18.1, dubbed Serena. We found a solid operating system that can run into problems in edge case scenarios.To read this article in full or to leave a comment, please click here(Insider Story)

Angry Shadow Brokers release password for suspected NSA hacking tools

Annoyed with the U.S. missile strike last week on an airfield in Syria, among other things, hacker group Shadow Brokers resurfaced on Saturday and released what they said was the password to files containing suspected National Security Agency tools they had earlier tried to sell.“Is appearing you are abandoning ‘your base’, ‘the movement’, and the peoples who getting you elected,” the group wrote in broken English in a letter to U.S. President Donald Trump posted online on Saturday.The hacker group, believed by some security experts to have Russian links, released in January an arsenal of tools that appeared designed to spy on Windows systems, after trying to to sell these and other supposedly Windows and Unix hacking tools for bitcoin.To read this article in full or to leave a comment, please click here

Angry Shadow Brokers release password for suspected NSA hacking tools

Annoyed with the U.S. missile strike last week on an airfield in Syria, among other things, hacker group Shadow Brokers resurfaced on Saturday and released what they said was the password to files containing suspected National Security Agency tools they had earlier tried to sell.“Is appearing you are abandoning ‘your base’, ‘the movement’, and the peoples who getting you elected,” the group wrote in broken English in a letter to U.S. President Donald Trump posted online on Saturday.The hacker group, believed by some security experts to have Russian links, released in January an arsenal of tools that appeared designed to spy on Windows systems, after trying to to sell these and other supposedly Windows and Unix hacking tools for bitcoin.To read this article in full or to leave a comment, please click here

IETF 98 Report

The IETF meetings are relatively packed events lasting over a week, and it’s just not possible to attend every session. Inevitably each attendee follows their own interests and participates in Working Group sessions that are relevant and interesting to them. I do much the same when I attend IETF meetings. The IETF met for IETF 98 in Chicago at the end of March, and from the various sessions I attended here are a few personal impressions that I would like to share.

Arista gets important win over Cisco in patent battle

In yet another twist to the ongoing patent and copyright infringement case between Cisco and Arista, Arista has landed a significant win that will let it once again import redesigned products to the US that have been under import embargo since January.Specifically, according to a post on Arista’s site, on “April 7, 2017, U.S. Customs and Border Protection (“CBP”) completed its review and once again ruled that Arista’s redesigned products do not infringe the ’592, ’145, or ’537 patents that were the subject of a limited exclusion order and cease and desist order issued by the United States International Trade Commission (ITC) in Investigation No. 337-TA-944 and that Arista may resume importing its redesigned products into the United States.”To read this article in full or to leave a comment, please click here

Arista gets important win over Cisco in patent battle

In yet another twist to the ongoing patent and copyright infringement case between Cisco and Arista, Arista has landed a significant win that will let it once again import redesigned products to the US that have been under import embargo since January.Specifically, according to a post on Arista’s site, on “April 7, 2017, U.S. Customs and Border Protection (“CBP”) completed its review and once again ruled that Arista’s redesigned products do not infringe the ’592, ’145, or ’537 patents that were the subject of a limited exclusion order and cease and desist order issued by the United States International Trade Commission (ITC) in Investigation No. 337-TA-944 and that Arista may resume importing its redesigned products into the United States.”To read this article in full or to leave a comment, please click here

Arista gets important win over Cisco in patent battle

In yet another twist to the ongoing patent and copyright infringement case between Cisco and Arista, Arista has landed a significant win that will let it once again import redesigned products to the US that have been under import embargo since January.Specifically, according to a post on Arista’s site, on “April 7, 2017, U.S. Customs and Border Protection (“CBP”) completed its review and once again ruled that Arista’s redesigned products do not infringe the ’592, ’145, or ’537 patents that were the subject of a limited exclusion order and cease and desist order issued by the United States International Trade Commission (ITC) in Investigation No. 337-TA-944 and that Arista may resume importing its redesigned products into the United States.”To read this article in full or to leave a comment, please click here

Dallas blames hacker for setting off all 156 emergency warning sirens

Imagine it being nearly midnight and the emergency warning sirens start wailing and continue to scream for about an hour and a half. That’s what happened in Dallas on Friday; at 11:42 p.m., the city’s 156 emergency sirens blasted out warnings and continued to wail until 1:17 a.m. on Saturday. Dallas officials claim the siren warning system was hacked and it was one of the largest breaches of an emergency siren system.At first, a city spokesperson blamed the blaring sirens on a “system malfunction.” The 1.6 million people in the city were asked to stop calling 911 because there was no emergency. The normal wait time for a 911 call in Dallas is reportedly 10 seconds, but at one point the 911 system was so clogged with calls that the wait time stretched to six minutes.To read this article in full or to leave a comment, please click here

Dallas blames hacker for setting off all 156 emergency warning sirens

Imagine it being nearly midnight and the emergency warning sirens start wailing and continue to scream for about an hour and a half. That’s what happened in Dallas on Friday; at 11:42 p.m., the city’s 156 emergency sirens blasted out warnings and continued to wail until 1:17 a.m. on Saturday. Dallas officials claim the siren warning system was hacked and it was one of the largest breaches of an emergency siren system.At first, a city spokesperson blamed the blaring sirens on a “system malfunction.” The 1.6 million people in the city were asked to stop calling 911 because there was no emergency. The normal wait time for a 911 call in Dallas is reportedly 10 seconds, but at one point the 911 system was so clogged with calls that the wait time stretched to six minutes.To read this article in full or to leave a comment, please click here

Startup founded by FireEye alum goes after FireEye

A former FireEye engineer has kicked off a startup whose machine learning and artificial intelligence technologies will compete against his former employer’s threat-prevention platforms.SlashNext makes Active Cyber Defense System, a service with a cloud-based learning component that can detect data exfiltration, malware, exploits and social engineering attacks, says the company’s founder and CEO Atif Mushtaq. SlashNext SlashNext CEO Atif Mushtaq: "The system has a low false positive rate."To read this article in full or to leave a comment, please click here

Startup founded by FireEye alum goes after FireEye

A former FireEye engineer has kicked off a startup whose machine learning and artificial intelligence technologies will compete against his former employer’s threat-prevention platforms.SlashNext makes Active Cyber Defense System, a service with a cloud-based learning component that can detect data exfiltration, malware, exploits and social engineering attacks, says the company’s founder and CEO Atif Mushtaq. SlashNext SlashNext CEO Atif Mushtaq: "The system has a low false positive rate."To read this article in full or to leave a comment, please click here

OpenVPN – TCP or UDP tunneling?

Spoiler alert: You most likely would want to use UDP tunneling!

An OpenVPN tunnel runs over IP and can encapsulates VPN traffic into either a UDP or a TCP connection. To understand the pros and cons of each, we first need to have an understanding of them both.

TCP

Transmission Control Protocol is the dominant protocol there is for most daily stuff happening on a network. It has some very interesting features built-in which makes it very resistant to network packet loss, packet reordering, packet duplication, unintentional packet corruption and even link congestion. Despite it being not perfect1, it’s survived the test of time and it’s not going anywhere in near future.

All those features however come at a price. A typical TCP packet has a header size of 20 bytes. Assuming you’re using IPv4, You also get a 20 bytes IP header added on top of it. So at least 40 bytes in each TCP packet is the header data that comes before the actual payload.

UDP

Unlike TCP, User Datagram Protocol does not come with much features. It comes with a checksum header for packet integrity but connection reliably as a whole is not guaranteed. In Continue reading

Site News: RSS Feed Update

Do to ongoing problems with RSS feed hosting from Feedblitz, I am migrating the RSS feed to a new provider on Wednesday, 12 Apr 2017.

This may cause previously ‘read’ articles in your RSS feed to show as new. Its depends on how your RSS Reader the articles as “new” and what criteria they use to detect new/read.

Apologies in advance for the inconvenience but cannot continue with the unpredictable service, poor support and low quality website that Feedblitz has delivered over the last six months.

The RSS subscription is URL is unchanged http://feeds.etherealmind.com/etherealmind which should require no changes on your part.

The post Site News: RSS Feed Update appeared first on EtherealMind.

iPhone 8 price may be cheaper than you think

Apple's upcoming iPhone 8 is poised to be a complete game-changer. After years of keeping the iPhone form factor more or less unchanged, the iPhone 8 will likely feature an edgeless OLED display with a Touch ID sensor embedded into the screen itself. Additionally, it's widely believed that the iPhone 8 will offer up improved water resistance, faster internals, wireless charging, facial recognition software and much more.While nothing is ever a guarantee until Apple makes it official, there's good reason to believe that the iPhone 8 will represent one of the biggest leap forwards in iPhone technology we've seen in years. Having said that, there have been a number of interesting rumors regarding the iPhone 8's retail price over the past few weeks.To read this article in full or to leave a comment, please click here

Converge your network with explicit congestion notification

Every now and again, we like to highlight a piece of technology or solution featured in Cumulus Linux that we find especially useful. Priority Flow Control (PFC) and Explicit Congestion Notification (ECN) are exactly such things. In short, these technologies allow you to converge networks and save money. By supporting lossless or near lossless Ethernet, you can now run applications such as RDMA over Converged Ethernet (RoCE) or RoCEv2 over your current data center infrastructure. In this post, we’ll concentrate on the end-to-end solution for RoCEv2 – ECN and how it can help you optimize your network. We will cover PFC in a future post.

What is explicit congestion notification?

ECN is a mechanism supported by Cumulus Linux that helps provide end-to-end lossless communication between two endpoints over an IP routed network. Normally, protocols like TCP use dropped packets to indicate congestion, which then tells the sender to “slow down’. Explicit congestion notification uses this same concept, but instead of dropping packets after the queues are completely full, it notifies the receiving host that there was some congestion before the queues are completely full, thereby avoiding dropping traffic. It uses the IP layer (ECN bits in the IP TOS header) Continue reading

EP13: Colin McNamara DevOps expert and cloud architect shares with us on how to secure your future in IT!

Colin McNamara is the Founder and Principle Consultant at Farkley, where he helps Companies, Communities and Individuals succeed in a world be transformed by next generation technologies.  Previously he was running DevOps at Dimension Data and has been a very early adopter of the practice. His expertise is around SDN, DevOps, and is an OpenStack ambassador.

Sponsor: www.zerotoEngineer.com – Level up and become a full stack network engineer!

Your favorite quote?
The difficult we do immediately, the impossible just takes a little longer – U.S. Navy Seabeas

Continue reading