Facebook helps companies detect rogue SSL certificates for domains

Facebook has launched a tool that allows domain name owners to discover TLS/SSL certificates that were issued without their knowledge.The tool uses data collected from the many Certificate Transparency logs that are publicly accessible. Certificate Transparency (CT) is a new open standard requiring certificate authorities to disclose the certificate that they issue.Until a few years ago, there was no way of tracking the certificates issued by every certificate authority (CA). At best, researchers could scan the entire web and collect those certificates being used on public servers. This made it very hard to discover cases where CAs issued certificates for domain names without the approval of those domains' owners.To read this article in full or to leave a comment, please click here

Facebook helps companies detect rogue SSL certificates for domains

Facebook has launched a tool that allows domain name owners to discover TLS/SSL certificates that were issued without their knowledge.The tool uses data collected from the many Certificate Transparency logs that are publicly accessible. Certificate Transparency (CT) is a new open standard requiring certificate authorities to disclose the certificate that they issue.Until a few years ago, there was no way of tracking the certificates issued by every certificate authority (CA). At best, researchers could scan the entire web and collect those certificates being used on public servers. This made it very hard to discover cases where CAs issued certificates for domain names without the approval of those domains' owners.To read this article in full or to leave a comment, please click here

U.S. DOT advances mandate for vehicle-to-vehicle communications technology

Looking to put a high-tech solution to a deadly problem the U.S. Department of Transportation has issued a proposed rule to standardize the development and implementation of vehicle communications technologies in cars and trucks. The idea is to enable a multitude of new crash-avoidance applications that could save lives by preventing “hundreds of thousands of crashes every year by helping vehicles “talk” to each other,” the DOT stated.+More on Network World: Six key challenges loom over car communication technology+To read this article in full or to leave a comment, please click here

U.S. DOT advances mandate for vehicle-to-vehicle communications technology

Looking to put a high-tech solution to a deadly problem the U.S. Department of Transportation has issued a proposed rule to standardize the development and implementation of vehicle communications technologies in cars and trucks. The idea is to enable a multitude of new crash-avoidance applications that could save lives by preventing “hundreds of thousands of crashes every year by helping vehicles “talk” to each other,” the DOT stated.+More on Network World: Six key challenges loom over car communication technology+To read this article in full or to leave a comment, please click here

A Scalable Alternative to RESTful Communication: Mimicking Google’s Search Autocomplete with a Single MigratoryData Server

This is a guest post by Mihai Rotaru, CTO of MigratoryData.

Using the RESTful HTTP request-response approach can become very inefficient for websites requiring real-time communication. We propose a new approach and exemplify it with a well-known feature that requires real-time communication, and which is included by most websites: search box autocomplete.

Google, which is one of the most demanding web search environments, seems to handle about 40,000 searches per second according to an estimation made by Internet Live Stats. Supposing that for each search, a number of 6 autocomplete requests are made, we show that MigratoryData can handle this load using a single 1U server.

More precisely, we show that a single MigratoryData server running on a 1U machine can handle 240,000 autocomplete requests per second from 1 million concurrent users with a mean round-trip latency of 11.82 milliseconds.

The Current Approach and Its Limitations

What the mainstream media didn’t tell you about fake news

If fake news reports by the mainstream news media are true, all it takes to create fake news are some clever Romanian or Macedonian teenagers with malicious intent and a website—and shazam the fake news propagates throughout Facebook. The reality is SEO, backlinks, paid promotion and other content strategies play a key role.It is odd that mainstream news media would miss the most critical issue because after all, organic and paid promotion of internet traffic is what has put most of them on financial life support.How fake news starts Promotion starts with a fake news site with a credible URL name, such as realtruenews.org, probably built with WordPress and themed to look like a real news site. The end goal is to get tens or hundreds of thousands of gullible people to share the stories onto Facebook. Gullible reporters help, too.To read this article in full or to leave a comment, please click here

DNS provider ChangeIP cites MySQL database crash for days-long outage

ChangeIP, which refers to itself as a "rockstar, low-cost and high-touch web host," has hit a sour note with customers over the past few days. The company on Monday afternoon reported that it "suffered a system wide DB failure that cascaded to all of our DB systems. Restore been on going since yesterday [Sunday, Dec. 11]." ChangeIP said that due to the size of its MySQL database, recovery was taking longer than anticipated and it was hard to say when a total restore would take place. Early on Tuesday (eastern time), the company said its DNS service had been restored, but that it was still working to restore its database and get web, dynamic DNS and control panel functions back in working order.To read this article in full or to leave a comment, please click here

Convert ASP.NET Web Servers to Docker with Image2Docker

A major update to Image2Docker was released last week, which adds ASP.NET support to the tool. Now you can take a virtualized web server in Hyper-V and extract a Docker image for each website in the VM – including ASP.NET WebForms, MVC and WebApi apps. 

image2docker

Image2Docker is a PowerShell module which extracts applications from a Windows Virtual Machine image into a Dockerfile. You can use it as a first pass to take workloads from existing servers and move them to Docker containers on Windows.

The tool was first released in September 2016, and we’ve had some great work on it from PowerShell gurus like Docker Captain Trevor Sullivan and Microsoft MVP Ryan Yates. The latest version has enhanced functionality for inspecting IIS – you can now extract ASP.NET websites straight into Dockerfiles.

In Brief

If you have a Virtual Machine disk image (VHD, VHDX or WIM), you can extract all the IIS websites from it by installing Image2Docker and running ConvertTo-Dockerfile like this:

Install-Module Image2Docker
Import-Module Image2Docker
ConvertTo-Dockerfile -ImagePath C:\win-2016-iis.vhd -Artifact IIS -OutputPath c:\i2d2\iis

That will produce a Dockerfile which you can build into a Windows container image, using docker build.

How It Works

The Image2Docker Continue reading

IDG Contributor Network: How business growth relates to business infrastructure

With the U.S. Presidential election over, there is now talk about infrastructure investment, and by that, most people mean roads and bridges.But not so fast. The most important infrastructure of a modern economy or a modern business is the digital infrastructure. And it’s in worse shape than our roads and bridges. Most of today’s networks were put in place 20 years ago, well before the debilitating forces of cloud, big data, social, mobile computing, and most recently the Internet of Things (IoT) eroded their effectiveness and caused data traffic congestion.+ Also on Network World: Digital transformation: Not your grandfather’s bank + Sure, these networks still work—they still chug along, even if they’re slower and more vulnerable than we’d like. And let’s face it; it’s human nature to take an "if it ain’t broke, don’t fix it" approach. But that approach didn’t work in the 1990s for the brick-and-mortar businesses as the internet era emerged, and it won’t work today for any company that needs to digitally transform and do business in the network age.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How business growth relates to business infrastructure

With the U.S. Presidential election over, there is now talk about infrastructure investment, and by that, most people mean roads and bridges.But not so fast. The most important infrastructure of a modern economy or a modern business is the digital infrastructure. And it’s in worse shape than our roads and bridges. Most of today’s networks were put in place 20 years ago, well before the debilitating forces of cloud, big data, social, mobile computing, and most recently the Internet of Things (IoT) eroded their effectiveness and caused data traffic congestion.+ Also on Network World: Digital transformation: Not your grandfather’s bank + Sure, these networks still work—they still chug along, even if they’re slower and more vulnerable than we’d like. And let’s face it; it’s human nature to take an "if it ain’t broke, don’t fix it" approach. But that approach didn’t work in the 1990s for the brick-and-mortar businesses as the internet era emerged, and it won’t work today for any company that needs to digitally transform and do business in the network age.To read this article in full or to leave a comment, please click here

Zen and the art of security

I’m a Zen heretic, and so also is my sense of systems security.A very cogent citation describes the folly of it all. The people who install toolbars, click on random stuff and feel like they won something when they downloaded the free app are too plentiful, and security is too tough to understand—even PGP. Bringing up the bottom is as important as extending the top. We don’t ritualize security because that would be too tough, to impolite to do. Your mother did not teach you to use complex passwords and to change them as frequently as your underwear. Given some people I know, it’s a wonder they passed the “p@55w0rd” rubric they were trained to use.To read this article in full or to leave a comment, please click here

Zen and the art of security

I’m a Zen heretic, and so also is my sense of systems security.A very cogent citation describes the folly of it all. The people who install toolbars, click on random stuff and feel like they won something when they downloaded the free app are too plentiful, and security is too tough to understand—even PGP. Bringing up the bottom is as important as extending the top. We don’t ritualize security because that would be too tough, to impolite to do. Your mother did not teach you to use complex passwords and to change them as frequently as your underwear. Given some people I know, it’s a wonder they passed the “p@55w0rd” rubric they were trained to use.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Wi-Fi chip cannibalizes ambient Wi-Fi signals for power

Harvesting electromagnetic energy from thin air to develop self-sustaining Internet of Things (IoT) communications may become reality thanks to a new technology called HitchHike. The goal is to reduce the need for continual maintenance of the expected billions of IoT installations. Researchers say they’re close to the finish line. Worst case scenario, they say they’ll be able to get Wi-Fi chips to run for 10 years on the same, small battery.“HitchHike is the first self-sufficient Wi-Fi system that enables data transmission using just micro-watts of energy, almost zero,” claims Pengyu Zhang, a Stanford researcher, in a recent press release from the school.To read this article in full or to leave a comment, please click here

Netgear starts patching routers affected by a critical flaw

Networking device manufacturer Netgear released firmware updates for several router models in order to patch a critical vulnerability that's publicly known and could be exploited by hackers.The vulnerability was disclosed by a researcher Friday and affects multiple Netgear router models, many from the company's Nighthawk series. The company initially confirmed the flaw in three models -- R6400, R7000, R8000 -- but it has since expanded the list to include five more.The models confirmed to be affected so far are: R6250, R6400, R6700, R7000, R7100LG, R7300, R7900 and R8000. This list might not be complete as Netgear continues to analyze the flaw's impact to its entire router portfolio.To read this article in full or to leave a comment, please click here

Netgear starts patching routers affected by a critical flaw

Networking device manufacturer Netgear released firmware updates for several router models in order to patch a critical vulnerability that's publicly known and could be exploited by hackers.The vulnerability was disclosed by a researcher Friday and affects multiple Netgear router models, many from the company's Nighthawk series. The company initially confirmed the flaw in three models -- R6400, R7000, R8000 -- but it has since expanded the list to include five more.The models confirmed to be affected so far are: R6250, R6400, R6700, R7000, R7100LG, R7300, R7900 and R8000. This list might not be complete as Netgear continues to analyze the flaw's impact to its entire router portfolio.To read this article in full or to leave a comment, please click here