How to use Ansible ios_config to configure devices

A lot of new networking modules were released as part of Ansible 2.1. The Cisco IOS, IOS XR, NXOS, Junos and Arista EOS platforms got three common modules, the platform_config, platform_command and platform_template. The command and template modules more or less explains themselves. The config modules have some more tricks to them and I’ve gotten a few questions about how they work. In this article I’m going to focus on the ios_config module and show how you can use it to configure Cisco IOS devices. Future version of Ansible will add more parameters, this article is for Ansible 2.1.

Continue reading

How to use Ansible ios_config to configure devices

A lot of new networking modules were released as part of Ansible 2.1. The Cisco IOS, IOS XR, NXOS, Junos and Arista EOS platforms got three common modules, the platform_config, platform_command and platform_template. The command and template modules more or less explains themselves. The config modules have some more tricks to them and I’ve gotten a few questions about how they work. In this article I’m going to focus on the ios_config module and show how you can use it to configure Cisco IOS devices. Future version of Ansible will add more parameters, this article is for Ansible 2.1.
Continue reading

Krebs’ site under attack after alleged owners of DDoS-for-hire service were arrested

After security journalist Brian Krebs exposed the DDoS-for-hire service, vDOS, and the alleged owners of the service were arrested, a massive attack was launched against the Krebs on Security site.Last Thursday, Krebs wrote about vDOS and the two 18-year-old Israeli hackers running the DDoS attack service. In the past two years, the duo launched over 150,000 attacks and made at least $618,000. vDOS had been hacked and Krebs had obtained a copy of the vDOS database.vDOS had paying subscribers with the cost depending upon how many seconds the DDoS attack lasted. Krebs reported, “In just four months between April and July 2016, vDOS was responsible for launching more than 277 million seconds of attack time, or approximately 8.81 years’ worth of attack traffic.”To read this article in full or to leave a comment, please click here

Krebs’ site under attack after alleged owners of DDoS-for-hire service were arrested

After security journalist Brian Krebs exposed the DDoS-for-hire service, vDOS, and the alleged owners of the service were arrested, a massive attack was launched against the Krebs on Security site.Last Thursday, Krebs wrote about vDOS and the two 18-year-old Israeli hackers running the DDoS attack service. In the past two years, the duo launched over 150,000 attacks and made at least $618,000. vDOS had been hacked and Krebs had obtained a copy of the vDOS database.vDOS had paying subscribers with the cost depending upon how many seconds the DDoS attack lasted. Krebs reported, “In just four months between April and July 2016, vDOS was responsible for launching more than 277 million seconds of attack time, or approximately 8.81 years’ worth of attack traffic.”To read this article in full or to leave a comment, please click here

Eero, my Wi-Fi hero

Getting really good Wi-Fi coverage is hard in most buildings unless you can place your access point in the center of the building and the building doesn’t have lots of metal in it to distort and attenuate the signal. A cheap solution is to use a range extender to improve the reach of your Wi-Fi but, unfortunately, many of these products use a single radio to repeat the signal which results in reduced bandwidth. There is, however, a better way: Eero, a company that’s been shipping their eponymously named product for just over a year, have the best solution I’ve tested so far. The eero system (I must note here that the company and devices are named after the architect Eero Saarinen, famous for his clean, sophisticated design aesthetic, and Eero writes the device’s name in the style of e.e. cummings: all lower case, thus “eero”) creates a mesh network, each node having two radios so that they can send and receive simultaneously using adaptive routing to maximize throughput. The product really is nicely designed with the same kind of polished look and feel that characterizes Apple’s products (in fact, the design strikes me a much like the Continue reading

Eero, my Wi-Fi hero

Getting really good Wi-Fi coverage is hard in most buildings unless you can place your access point in the center of the building and the building doesn’t have lots of metal in it to distort and attenuate the signal. A cheap solution is to use a range extender to improve the reach of your Wi-Fi but, unfortunately, many of these products use a single radio to repeat the signal which results in reduced bandwidth. There is, however, a better way: Eero, a company that’s been shipping their eponymously named product for just over a year, have the best solution I’ve tested so far. The eero system (I must note here that the company and devices are named after the architect Eero Saarinen, famous for his clean, sophisticated design aesthetic, and Eero writes the device’s name in the style of e.e. cummings: all lower case, thus “eero”) creates a mesh network, each node having two radios so that they can send and receive simultaneously using adaptive routing to maximize throughput. The product really is nicely designed with the same kind of polished look and feel that characterizes Apple’s products (in fact, the design strikes me a much like the Continue reading

Down with idiotic disclaimer footers and dumb surveys!

How often do you receive an email message with a footer like this: The contents are not to be disclosed to anyone other than the addressee. Unauthorised recipients must preserve this confidentiality and should please advise the sender immediately of any error in transmission. This gem of pseudo-legal nonsense is from a message that I did not solicit and is the work of eDigitalResearch.com at the behest of ”The Expedia Customer Experience Team." At some point, someone in either or both organizations must have thought this footer was necessary which is curious because the serious, weighty, highly private content in the message was a customer satisfaction survey addressed to me. Was this, you might be wondering, a very personalized survey with, perhaps, sensitive, personal data included? Nope, and here, at the very slight risk of their dogs of law snapping at me, is the message that had the above footer appended:To read this article in full or to leave a comment, please click here

ISSU Upgrade of Cisco Catalyst 6880-X VSS Cluster and 6800ia FEX extenders

How does Internet work - We know what is networking

I wrote all the details about ISSU procedure steps and explained each step extensively. For a shorter update procedure guide check abbreviated article: Short list of upgrade steps without extensive explanations “Cisco Catalyst 6880-X VSS ISSU Upgrade Steps“ Intro Cisco spoiled us over the years with great and detailed documentation on each technology and hardware component they support. Still, I managed to find a part where documentation is not detailed enough to give you definite number of steps to get things done. While preparing for software upgrade of Cisco Catalyst 6880-X VSS cluster I stumbled on one of the first examples of

ISSU Upgrade of Cisco Catalyst 6880-X VSS Cluster and 6800ia FEX extenders

Cisco Catalyst 6880-X VSS ISSU Upgrade Steps

How does Internet work - We know what is networking

I wrote extensively about ISSU procedure steps in the article: “ISSU Upgrade of Cisco Catalyst 6880-X VSS cluster and its four 6800ia FEX extenders“ This is a short version without comments and explanations for those that need to get things done quickly without reading through my extensive waffle. Let’s start! 1. Get the info on which IOS version is supported to be upgraded with ISSU Google for ISSU or EFSU IOS upgrade support or use this Cisco doc “SX_SY_EFSU_Compatibility_Matrix1” to select supported IOS for ISSU upgrade from your current version. 2. Upload IOS to both Chassis copy ftp://admin:[email protected]/c6880x-adventerprisek9-mz.SPA.151-2.SY7.bin bootdisk: and

Cisco Catalyst 6880-X VSS ISSU Upgrade Steps

US consumer product safety agency warns against use of Galaxy Note 7

Samsung Electronics’ woes mounted Friday with the U.S. Consumer Product Safety Commission urging consumers to power down and stop charging or using their Galaxy Note 7 smartphones, after reports of the overheating and bursting of the lithium-ion battery in the device in some cases. The statement by the CPSC comes a day after the Federal Aviation Administration advised passengers not to turn on, charge or stow away their devices in checked baggage when on board aircraft. Three airlines in Australia, including Qantas, its unit Jetstar and Virgin Australia, have also prohibited their passengers from using or charging the Galaxy Note 7 during flight.To read this article in full or to leave a comment, please click here

Crafty malware is found targeting U.S. government employees

A tough-to-detect malware that attacks government and corporate computers has been upgraded, making it more aggressive in its mission to steal sensitive files, according to security firm InfoArmor.Last November, InfoArmor published details on GovRAT, a sophisticated piece of malware that’s designed to bypass antivirus tools. It does this by using stolen digital certificates to avoid detection.Through GovRAT, hackers can potentially steal files from a victim’s computer, remotely execute commands, or upload other malware to the system.To read this article in full or to leave a comment, please click here

Crafty malware is found targeting U.S. government employees

A tough-to-detect malware that attacks government and corporate computers has been upgraded, making it more aggressive in its mission to steal sensitive files, according to security firm InfoArmor.Last November, InfoArmor published details on GovRAT, a sophisticated piece of malware that’s designed to bypass antivirus tools. It does this by using stolen digital certificates to avoid detection.Through GovRAT, hackers can potentially steal files from a victim’s computer, remotely execute commands, or upload other malware to the system.To read this article in full or to leave a comment, please click here

Here’s why Microsoft and Google have the same competitor as a partner

It sounds like the start of a bad joke: executives from Microsoft, Google, Amazon and IBM walk into a conference with one thing in common. But all of those companies are appearing on stage at BoxWorks in San Francisco, in part because they all work with the cloud storage and content services company in one capacity or another.Box works with Microsoft to integrate its products with Office 365, Amazon to host services in different cloud data centers, and IBM on new applications, services and sales. Google is the newest addition to that club -- the two companies announced Wednesday that they're working on storing Google Docs, Sheets and Slides files inside Box.  To read this article in full or to leave a comment, please click here

The 5G mobile challenge: Selling a dream

At this week’s CTIA Super Mobility show, it took someone from outside the mobile business to point out what could be a nagging question: Why, exactly, do we need the faster speeds of 5G wireless?Keynote speeches at CTIA, the main annual event for U.S. mobile operators, are heavy on futuristic applications and urgent calls for more spectrum and new networks to make those dreams real. On Wednesday, CTIA President and CEO Meredith Attwell Baker said U.S. carriers would need hundreds of megahertz of additional frequencies to meet mobile demands over the next decade.But on the same stage Thursday, when Broadcast.com founder, Dallas Mavericks owner and entertainment mogul Mark Cuban was asked what’s missing in the wireless business, he answered without hesitation.To read this article in full or to leave a comment, please click here

Best Deals of the Week, September 5th – September 9th – Deal Alert

Best Deals of the Week, September 5th - September 9th - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of September 5th. All items are highly rated, and dramatically discounted!45% off Epica Emergency Solar Hand Crank AM/FM/NOAA Digital Radio, Flashlight, Cell Phone ChargerWith its compact design, 3-LED flashlight, and 5-way charging (hand crank, solar, USB, AC and DC), and retractable antennae, you'll never be left in the dark. The high-quality digital tuner (AM/FM/all 7 WeatherBand channels) lets you get all your news. Also, you can charge your cell with it. The rugged body and solar panels are water resistant and will stay strong between uses. The unit averages 4.5 out of 5 stars from over 800 people (read reviews). Its typical list price of $39.95has been reduced to $21.95. To read this article in full or to leave a comment, please click here

Docker Weekly Roundup | September 4, 2016

weekly-roundup.png

Each week, Docker rounds up the most popular, informative, and thought-provoking articles from the tech community. This week, we delve into current options for securing Docker in production environments, unveil Microsoft’s container monitoring solution and answer the top Docker questions from VMWorld. As we begin a new week, let’s recap our top five most-read stories for the week of September 4, 2016:

 


Weekly #Roundup: Top 5 #Docker stories for the week 09/04/16 via @Docker
Click To Tweet


The post Docker Weekly Roundup | September 4, 2016 appeared first on Docker Blog.

Faster, longer-range Bluetooth 5 to reach devices soon

A new version of the Bluetooth wireless spec will be coming to devices soon, giving users faster connectivity among devices over longer distances.The new version, Bluetooth 5, is a big upgrade over Bluetooth 4.2, the current specification. In a clear line of sight, the range of Bluetooth 5 could stretch to 400 meters, said analysts at The Linley Group in a research note this week. That means users could connect a smartphone to a Bluetooth speaker that may not even be visible.Final Bluetooth 5 specifications will be disclosed by the end of this year or early next year, the Linley analysts said.In a typical, realistic setting, Bluetooth 5 will offer a range of up to 120 meters, which is four times that of Bluetooth 4.2, and be two times faster, with data transfer rates of 2Mbps, said Chuck Sabin, director for business strategy at the Bluetooth-Special Interest Group, which sets the standards for Bluetooth.To read this article in full or to leave a comment, please click here

Faster, longer-range Bluetooth 5 to reach devices soon

A new version of the Bluetooth wireless spec will be coming to devices soon, giving users faster connectivity among devices over longer distances.The new version, Bluetooth 5, is a big upgrade over Bluetooth 4.2, the current specification. In a clear line of sight, the range of Bluetooth 5 could stretch to 400 meters, said analysts at The Linley Group in a research note this week. That means users could connect a smartphone to a Bluetooth speaker that may not even be visible.Final Bluetooth 5 specifications will be disclosed by the end of this year or early next year, the Linley analysts said.In a typical, realistic setting, Bluetooth 5 will offer a range of up to 120 meters, which is four times that of Bluetooth 4.2, and be two times faster, with data transfer rates of 2Mbps, said Chuck Sabin, director for business strategy at the Bluetooth-Special Interest Group, which sets the standards for Bluetooth.To read this article in full or to leave a comment, please click here