How to Clear Entire Configuration of your Juniper Device

How Does Internet Work - We know what is networking

If you have a Juniper device that needs to be sent to RMA or you are just putting it to some other use on your network, you will probably want to completely clear the configuration on it. There are different ways to do it for different purpose. If you want to securely wipe all data from this device and make it completely like when you received it from the store then next command is the right one to use: root@RSRX> request system zeroize This one will completely wipe your Juniper device and clear configuration together with all data from flash.

How to Clear Entire Configuration of your Juniper Device

IDG Contributor Network: Can Google’s Key Transparency make encrypted email ubiquitous?

Today I’m going to talk about a topic that has gained a lot of attention since the presidential election: encrypted email.Services such as ProtonMail—a secure email system with end-to-end encryption—have reported record signup numbers in recent months. This parallels the increasing adoption and provision of encrypted instant messaging services such as Signal, Telegram, iMessage and WhatsApp. As someone who works in security, I applaud this; more people communicating via encrypted messaging can only be a good thing.+ Also on Network World: Enterprise encryption adoption up, but the devil's in the details + However, there is a big problem with encrypted email, which is that it mostly sucks. The problem lies in the open nature of email itself. Unlike proprietary messaging systems like WhatsApp, email is based on open-standards. Anyone can run their own email server, and you can send an email to anyone in the world just by knowing their email address using any software you like.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Can Google’s Key Transparency make encrypted email ubiquitous?

Today I’m going to talk about a topic that has gained a lot of attention since the presidential election: encrypted email.Services such as ProtonMail—a secure email system with end-to-end encryption—have reported record signup numbers in recent months. This parallels the increasing adoption and provision of encrypted instant messaging services such as Signal, Telegram, iMessage and WhatsApp. As someone who works in security, I applaud this; more people communicating via encrypted messaging can only be a good thing.+ Also on Network World: Enterprise encryption adoption up, but the devil's in the details + However, there is a big problem with encrypted email, which is that it mostly sucks. The problem lies in the open nature of email itself. Unlike proprietary messaging systems like WhatsApp, email is based on open-standards. Anyone can run their own email server, and you can send an email to anyone in the world just by knowing their email address using any software you like.To read this article in full or to leave a comment, please click here

Samsung sees strong demand for Galaxy S8 despite Note7 fiasco

Samsung is seeing strong demand for its Galaxy S8 and S8+ smartphones, suggesting that consumers may be looking beyond the company’s debacle with the Galaxy Note7.The company’s head of mobile DJ Koh said at a media event in South Korea on Thursday that pre-orders for the Galaxy S8 and S8+ had outstripped those for its predecessors, the Galaxy S7 and Galaxy S7 edge, which were launched in March last year.A Samsung spokesperson confirmed Koh’s remarks but did not provide figures for the pre-orders for the devices. The company disclosed, however, the number of pre-orders for the S8 and S8+ in home market South Korea, which were at over 728,000.To read this article in full or to leave a comment, please click here

30% off TP-Link Wi-Fi Smart Plug Mini – Deal Alert

This gadget from TP-Link plugs into a standard outlet and allows you to control it from anywhere using your smartphone, or with your voice through an Alexa device. Program on/off times or put it in "away mode" to simulate being home while you're away. The typical list price of $49.99 has been reduced 30% to $34.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

30% off TP-Link Wi-Fi Smart Plug Mini – Deal Alert

This gadget from TP-Link plugs into a standard outlet and allows you to control it from anywhere using your smartphone, or with your voice through an Alexa device. Program on/off times or put it in "away mode" to simulate being home while you're away. The typical list price of $49.99 has been reduced 30% to $34.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

33% off ThermoPro Wireless Digital Cooking Thermometer with Timer and 300 Feet Range – Deal Alert

ThermoPro's wireless cooking thermometer lets you monitor the temps of your food remotely, up to 300 feet away. It includes a built-in timer and programmable temperature alarms. Or if you're unsure, it comes pre-programmed with USDA approved temperatures for various meats. The probe is capable of accurately measuring temps from 16°F to 482°F and comes with a lifetime replacement warranty. ThermoPro's TP07 thermometer averages 4.5 out of 5 stars from over 1,300 people on Amazon (read reviews), where its typical list price of $45.99 has been reduced 33% to $30.59. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Does Google’s TPU Investment Make Sense Going Forward?

Google created quite a stir when it released architectural details and performance metrics for its homegrown Tensor Processing Unit (TPU) accelerator for machine learning algorithms last week. But as we (and many of you reading) pointed out, comparing the TPU to earlier “Kepler” generation GPUs from Nvidia was not exactly a fair comparison. Nvidia has done much in the “Maxwell” and “Pascal” GPU generations specifically to boost machine learning performance.

To set the record straight, Nvidia took some time and ran some benchmarks of its own to put the performance of its latest Pascal accelerators, particularly the ones it aims

Does Google’s TPU Investment Make Sense Going Forward? was written by Timothy Prickett Morgan at The Next Platform.

Munich: Cloudflare’s fifth data center in Germany

Oktoberfest has come early this year! We just turned up our latest data center in Munich: our 110th data center globally, and our fifth in Germany, joining Frankfurt, Düsseldorf, Berlin and Hamburg. Just over a mile away from the historic Hofbräuhaus, our newest deployment helps make six million websites faster across Bavaria, while providing additional redundancy and capacity to withstand attacks.

Oktoberfest kommt früh in diesem Jahr! Wir haben gerade unser 110. Rechenzentrum in München angeschaltet. Wir haben somit fünf Rechenzentren in Deutschland (Frankfurt, Düsseldorf, Berlin, Hamburg und München). Nur ca. 2 Kilometer entfernt vom historischen Hofbräuhaus, wird unser neustes Rechenzentrum sechs Millionen Webseiten im Raum Bayern schneller machen, und zugleich größere Kapazitäten gegen DDoS Attacken bereitstellen.

As TripAdvisor put it: Germany’s third largest city reflects the character of a city and a post card village at the same time.

Wie TripAdvisor es ausdrückt: Deutschlands drittgrößte Stadt spiegelt zugleich den Charakter einer Stadt und eines Dorfes wider.


CC BY-NC-ND 2.0 image by Werner Nieke

Continued Expansion

We have several additional locations being added to our fast expanding network that spans 55 countries. If you have a new city in mind, let us know, Continue reading

Synack: Hackers wanted after firm gets $21.25M funding from Microsoft, HPE

Penetration testing provider Synack is getting an infusion of $21.25 million from the investment arms of Microsoft and HP, among others, and some of it will be used to hire more security analysts to fuel what it calls its hacker-powered intelligence platform.The investment is the Series C round of funding and is led by Microsoft Ventures, but also includes Hewlett Packard Enterprise and Singtel Innov8 to bring total investment in the company to $55 million.+More on Network World: 6 vulnerabilities to watch for on the factory floor+To read this article in full or to leave a comment, please click here

Synack: Hackers wanted after firm gets $21.25M funding from Microsoft, HPE

Penetration testing provider Synack is getting an infusion of $21.25 million from the investment arms of Microsoft and HP, among others, and some of it will be used to hire more security analysts to fuel what it calls its hacker-powered intelligence platform.The investment is the Series C round of funding and is led by Microsoft Ventures, but also includes Hewlett Packard Enterprise and Singtel Innov8 to bring total investment in the company to $55 million.+More on Network World: 6 vulnerabilities to watch for on the factory floor+To read this article in full or to leave a comment, please click here

Shadow Brokers dump contained Solaris hacking tools

After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.To read this article in full or to leave a comment, please click here

Shadow Brokers dump contained Solaris hacking tools

After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.To read this article in full or to leave a comment, please click here

Raspberry Pi roundup: Searching for Pi, steampunk laptops, Code Angels, and a visit to Competitor Corner

One of the first big stories about the Raspberry Pi when it hit retail shelves more than five years ago was that it didn’t actually hit most retail shelves. Availability was a serious issue at launch, as the Raspberry Pi Foundation didn’t yet realize what a hit it had on its hands, and initial supplies didn’t last long. Pis began popping up on eBay for substantially inflated prices.The situation has gotten a lot more reasonable these days, but, for those of you having Pi sourcing problems, never fear – Verona University computer science student Marco Della Valle has created an attractive, functional site that automatically checks major retailers for their supplies of the Raspberry Pi Zero and Zero W models.To read this article in full or to leave a comment, please click here

Major zero-day flaw found in Microsoft Word

McAfee security researchers are warning of a new zero-day vulnerability in Microsoft Word being exploited via attached .rtf files since at least January.The exploit allows a Word document to install malware onto your PC without you ever knowing it, giving the attackers full access to your machine. According to McAfee, the exploit works by connecting to a remote server controlled by the hackers, which will download a file that runs as a .hta file, a dynamic HTML file that is used in Word. Security firm FireEye also noted similar malicious .rtf files in its own alert. Both firms say the flaws are within Microsoft's Object Linking and Embedding (OLE) technology and affects all versions of Office, including Office 2016 for Windows 10.To read this article in full or to leave a comment, please click here