Connected Classrooms: The Future of Education Technology

As a parent to two kids in elementary school, I’m continually amazed at how quickly teachers and students are using technology to effectively teach and gain new 21st Century skills. Instead of being bombarded with handouts every week, I receive only the ones that require my attention and acknowledgment; all other communication is through email or educational apps. For example, my kindergartener’s teacher uses Seesaw to share my son’s work in the classroom with me. Changing from asking “What did you do at school today?” to saying “I love what you did at school this week!” always brings a smile to his face.

All Flash No Longer Has To Compete With Disk

All-flash arrays are still new enough to be somewhat exotic but are – finally – becoming mainstream. As we have been saying for years, there will come a point where enterprises, which have much more complex and unpredictable workloads than hyperscalers and do not need the exabytes of capacity of cloud builders, just throw in the towel with disk drives and move to all flash and be done with it.

To be sure, disk drives will persist for many years to come, but perhaps not for as long as many as disk drive makers and flash naysayers had expected –

All Flash No Longer Has To Compete With Disk was written by Timothy Prickett Morgan at The Next Platform.

Attackers use hacked home routers to hit Russia’s 5 largest banks

Botnets made up of hacked home routers were used to launch distributed denial-of-service attacks against the five largest financial organizations in Russia.The attacks occurred on Monday, Dec. 5, and were detected and mitigated by Rostelecom, Russia's state-owned telecommunications company. The attacks peaked at 3.2 million packets per second (Mpps) and the longest attack lasted for over two hours, Rostelecom reported Friday.The company did not provide a bandwidth measurement for the attacks, but 3.2Mpps is not that much. DDoS mitigation providers regularly see attacks that exceed 100 Mpps and a very large September attack against the website of cybersecurity blogger Brian Krebs peaked at 665Gbps and 143Mpps.To read this article in full or to leave a comment, please click here

Attackers use hacked home routers to hit Russia’s 5 largest banks

Botnets made up of hacked home routers were used to launch distributed denial-of-service attacks against the five largest financial organizations in Russia.The attacks occurred on Monday, Dec. 5, and were detected and mitigated by Rostelecom, Russia's state-owned telecommunications company. The attacks peaked at 3.2 million packets per second (Mpps) and the longest attack lasted for over two hours, Rostelecom reported Friday.The company did not provide a bandwidth measurement for the attacks, but 3.2Mpps is not that much. DDoS mitigation providers regularly see attacks that exceed 100 Mpps and a very large September attack against the website of cybersecurity blogger Brian Krebs peaked at 665Gbps and 143Mpps.To read this article in full or to leave a comment, please click here

22% off ASUS Chromebook C202 11.6″ Rugged Water Resistant Design, 180 Degree Hinge – Deal Alert

The highly rated Chromebook C202 from ASUS features a 180-degree hinge, a spill-resistant keyboard, and a reinforced rubber wrapped frame that meets the daily rigors and intense usage that can happen in and outside the home or classroom. The ASUS Chromebook C202 uses a 360 degree WIFI antenna featuring latest generation 802.11a/b/g/n Wi-Fi which provides strong reception to minimize poor signal connection while you are on-the-go. With a built-in HDMI, USB ports, and a SD card reader, ASUS Chromebook C202 makes data transferring and sharing easy and fast. This model features an Intel Celeron N3060 Processor, 4 GB DDR3 RAM, Storage, 16GB Flash Storage, 11.6-inch HD 1366x768 Anti-Glare Display, and up to 10 hours of battery life on a charge. All for the currently discounted price of just $179. See the discounted ASUS Chromebook on Amazon.To read this article in full or to leave a comment, please click here

The IoT: Gateway for enterprise hackers

A very merry Christmas could give way to a not-so-happy New Year security hangover for enterprises, once a few million more Internet of Things (IoT) devices are unwrapped and migrate from homes into the workplace.So, a webinar this week hosted by The Security Ledger titled: “Who Let the IoT in?: Finding and securing wireless devices in your environment,” was designed to offer some advance advice on how to cope with it.Paul Roberts, founder and editor in chief of The Security Ledger, who moderated the event, began by framing part of the problem: Although the IoT is now well established, many of the legacy tools enterprises still use to identify and manage vulnerable devices were, “designed for the ‘Internet of Computers’ rather than the IoT.To read this article in full or to leave a comment, please click here

The IoT: Gateway for enterprise hackers

A very merry Christmas could give way to a not-so-happy New Year security hangover for enterprises, once a few million more Internet of Things (IoT) devices are unwrapped and migrate from homes into the workplace.So, a webinar this week hosted by The Security Ledger titled: “Who Let the IoT in?: Finding and securing wireless devices in your environment,” was designed to offer some advance advice on how to cope with it.Paul Roberts, founder and editor in chief of The Security Ledger, who moderated the event, began by framing part of the problem: Although the IoT is now well established, many of the legacy tools enterprises still use to identify and manage vulnerable devices were, “designed for the ‘Internet of Computers’ rather than the IoT.To read this article in full or to leave a comment, please click here

10 essential PowerShell security scripts for Windows administrators

PowerShell is an enormous addition to the Windows toolbox that gives Windows admins the ability to automate all sorts of tasks, such as rotating logs, deploying patches, and managing users. Whether it's specific Windows administration jobs or security-related tasks such as managing certificates and looking for attack activity, there is a way to do it in PowerShell.Speaking of security, there's a good chance someone has already created a PowerShell script or a module to handle the job. Microsoft hosts a gallery of community-contributed scripts that handle a variety of security chores, such as penetration testing, certificate management, and network forensics, to name a few.To read this article in full or to leave a comment, please click here(Insider Story)

10 essential PowerShell security scripts for Windows administrators

PowerShell is an enormous addition to the Windows toolbox that gives Windows admins the ability to automate all sorts of tasks, such as rotating logs, deploying patches, and managing users. Whether it's specific Windows administration jobs or security-related tasks such as managing certificates and looking for attack activity, there is a way to do it in PowerShell.To read this article in full or to leave a comment, please click here(Insider Story)

10 essential PowerShell security scripts for Windows administrators

PowerShell is an enormous addition to the Windows toolbox that gives Windows admins the ability to automate all sorts of tasks, such as rotating logs, deploying patches, and managing users. Whether it's specific Windows administration jobs or security-related tasks such as managing certificates and looking for attack activity, there is a way to do it in PowerShell.To read this article in full or to leave a comment, please click here(Insider Story)

How this analyst targeted a phisher

Not unlike any other threat analyst, Marc Laliberte's email inbox fills up minute by minute. Some of which has made its way past the spam filter. The WatchGuard employee decided to finally act upon a certain phishing attempt in hopes of teaching the bad guys a lesson.   Spear phishing is a type of phishing attack in which the perpetrator customizes their attack to a particular individual or group of individuals. The attacker gathers information on the victim and then tailors the attack to be more likely to fool the target. The would-be attack arrived as an email appearing to come from the finance employee’s manager, requesting an urgent wire transfer.To read this article in full or to leave a comment, please click here

How this analyst targeted a phisher

Not unlike any other threat analyst, Marc Laliberte's email inbox fills up minute by minute. Some of which has made its way past the spam filter. The WatchGuard employee decided to finally act upon a certain phishing attempt in hopes of teaching the bad guys a lesson.   Spear phishing is a type of phishing attack in which the perpetrator customizes their attack to a particular individual or group of individuals. The attacker gathers information on the victim and then tailors the attack to be more likely to fool the target. The would-be attack arrived as an email appearing to come from the finance employee’s manager, requesting an urgent wire transfer.To read this article in full or to leave a comment, please click here

ARP – Address Resolution Protocol

When ever Network Engineer thinks  of ARP , first thing which comes in his mind is MAC address and layer 2. MAC  Address is unique identity provided to NIC card for communication at layer 2. It’s also sometime referred as Burned-in-address or hardware Address. Every network engineer should have good understanding of ARP. ARP is […]

Running vQFX 10k on ESXi

As I'm currently studying DC certification track, I decided to setup my first vQFX lab. My current multi-vendors virtual LAB runs on ESXi, so I wished to keep my VMware hypervisor also for vQFX instances. I'm a lucky man, vmdk images for vQFX are now...

Running vQFX 10k on ESXi

As I'm currently studying DC certification track, I decided to setup my first vQFX lab. My current multi-vendors virtual LAB runs on ESXi, so I wished to keep my VMware hypervisor also for vQFX instances. I'm a lucky man, vmdk images for vQFX are now...

iPhone power plug knock-offs are a fire hazard

Sorry for the Daily Mail-like clickbait headline, but there's no simple way to say it. Chartered Trading Standards Institute, a U.K. group that's similar to the Consumer Product Safety Commission here in the U.S., issued a warning that 99 percent of the third-party Apple chargers do not meet proper shielding standards. The group tested 400 of these counterfeit Apple chargers and found only three of them were properly shielded to prevent a fatal electric shock or spark a fire Leon Livermore, CEO of Chartered Trading Standards Institute, told the BBC that shoppers should buy electrical goods only from trusted suppliers.To read this article in full or to leave a comment, please click here

7 hiring trends for 2017

Hiring is a challenge for CIOs, and it won’t get much easier in the coming year, particularly for IT departments that are trying to fill key security and networking roles.Two staffing and recruiting firms that specialize in IT – Robert Half Technology and TEKsystems – each released research this week that offers a glimpse of what’s expected on the hiring front in 2017. Here are some highlights from their respective reports.1. Don’t expect widespread salary gains A majority of IT leaders – 63% – expect overall 2017 IT salaries to stay the same compared to 2016 rates, and 1% expect salaries to decrease in the coming year. Just 36% of IT leaders say they plan to increase overall IT salaries in 2017, according to TEKsystems’ annual IT Forecast.To read this article in full or to leave a comment, please click here