Microsoft postpones Windows anti-exploit tool’s retirement

Microsoft last week announced that it would support the Enterprise Mitigation Experience Toolkit (EMET) through July 2018, a year-and-a-half extension for the anti-exploit utility.At the same time, the Redmond, Wash. company dismissed EMET as a behind-the-times tool, and again urged customers to upgrade to Windows 10, arguing that the new operating system is much more secure than previous editions when supplemented by EMET."EMET hasn't kept pace," wrote Jeffrey Sutherland, a Microsoft principal program manager lead, in a post to a company blog Nov. 3. "Its effectiveness against modern exploit kits has not been demonstrated, especially in comparison to the many security innovations built into Windows 10."To read this article in full or to leave a comment, please click here

Microsoft postpones Windows anti-exploit tool’s retirement

Microsoft last week announced that it would support the Enterprise Mitigation Experience Toolkit (EMET) through July 2018, a year-and-a-half extension for the anti-exploit utility.At the same time, the Redmond, Wash. company dismissed EMET as a behind-the-times tool, and again urged customers to upgrade to Windows 10, arguing that the new operating system is much more secure than previous editions when supplemented by EMET."EMET hasn't kept pace," wrote Jeffrey Sutherland, a Microsoft principal program manager lead, in a post to a company blog Nov. 3. "Its effectiveness against modern exploit kits has not been demonstrated, especially in comparison to the many security innovations built into Windows 10."To read this article in full or to leave a comment, please click here

Six big projects that went open-source

More code, more projectsMaking big software and hardware projects open-source is an increasingly popular thing to do, whether you’re a big company, a small company, or even the government. Here’s a sampling of the latest major projects to hit the open-source realm. Enjoy.Facebook’s VoyagerImage by FacebookTo read this article in full or to leave a comment, please click here

Docker San Francisco Meetup #50: Swarm Mode

Last Wednesday was Docker’s 50th meetup in San Francisco! There was an awesome turnout from the local Docker community to see Docker’s own Nishant Totla and Dongluo Chen and their talk on Swarm Mode.

Nishant and Dongluo gave a talk entitled ‘Using Docker Swarm Mode and healthchecks to Deploy Applications Without Loss’ where they demonstrated how to do service upgrades without impacting your application.

 

They explained that Docker swarm mode enables users to manage their applications with service primitives and the healthcheck feature provides health indications for a container. Coming up in the Docker 1.13 release, Docker Swarm can connect healthcheck results with load balancers to implement no-loss service upgrade. Check out the talk including Nishant’s demo in the video below.

 

 

Want to learn more about the Docker platform and Docker’s open source projects?



New blog post w/ Continue reading

When DR fails

Someone hacked into my main server. I have a small organization, and the server was an old Apple Xserve 10.6.7 chosen because it’s not the usual host. Now it’s time to scratch security through obscurity off the list.So let’s do a rudimentary recover. Forensics will have to wait.I went to a hosting company to spin up httpd and mail. They’re already my registrar. Pretty big organization.And they don’t have 24/7 support.Since this happened on a Saturday, I was already in trouble. I chose one of their hosting plans. It costs a rudimentary $60 for a web server plus mail. It uses the famous CPanel hosting.To read this article in full or to leave a comment, please click here

When DR fails

Someone hacked into my main server. I have a small organization, and the server was an old Apple Xserve 10.6.7 chosen because it’s not the usual host. Now it’s time to scratch security through obscurity off the list.So let’s do a rudimentary recover. Forensics will have to wait.I went to a hosting company to spin up httpd and mail. They’re already my registrar. Pretty big organization.And they don’t have 24/7 support.Since this happened on a Saturday, I was already in trouble. I chose one of their hosting plans. It costs a rudimentary $60 for a web server plus mail. It uses the famous CPanel hosting.To read this article in full or to leave a comment, please click here

Chasing The Dream Of Code HPC Once, Run Anywhere

In many ways, enterprises and hyperscalers have it easy. Very quickly in the wake of its announcement more than two decades ago, the Java programming language, a kind of virtualized C++, became the de facto standard for coding enterprise applications that run the business. And a slew of innovative storage and data analytics applications that have transformed computing were created by hyperscalers in Java and often open sourced so enterprises could use them.

The HPC community – and it is probably more accurate to say the many HPC communities – has it a bit tougher because they use a variety

Chasing The Dream Of Code HPC Once, Run Anywhere was written by Timothy Prickett Morgan at The Next Platform.

Diamonds could be building blocks for quantum computers

Diamonds are among the most expensive gems in the world, but they could also serve as a building block for quantum computers.Because diamonds are structurally sound, researchers believe they could eliminate some of the challenges involved in making stable quantum computers.The potential of quantum computers is enormous -- they could bring massive gains in computational power and ultimately replace today's PCs and servers.But universal quantum computers are still decades away, partly because of the complexity involved in building such systems. Quantum computers are considered notoriously unstable, but researchers working on ways to resolve existing material, programming, and hardware challenges.To read this article in full or to leave a comment, please click here

Microsoft patent hints at a more human-like Cortana

A newly discovered Microsoft patent hints that Microsoft is developing more personalized, "human-like" responses for Cortana, so she sounds less generic and speaks to the user directly using personal information.  The patent describes how user-specific information and contextual information is retrieved by querying a user profile database and one or more services, which generates a personalized greeting based on user-specific information, such as user inferences and interests, and the contextual information to generate the personalized greetings for presentation by the digital assistant on the client device. To read this article in full or to leave a comment, please click here

Best Deals of the Week, October 31st – November 4th – Deal Alert

Best Deals of the Week, October 31st - November 4thCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted.43% off NETGEAR AC750 WiFi Range ExtenderBoost the range of your existing WiFi and create a stronger signal in hard-to-reach areas with a WiFi range extender like this one from Netgear, which is highly rated and currently discounted 43% on Amazon. . This compact AC750 wall-plug WiFi booster delivers AC dual band WiFi up to 750 Mbps, and is small and discreet, easily blending into your home decor. Well over 13,000 people have reviewed the AC750 on Amazon (read reviews) and have given it an average of 4 out of 5 stars. Right now its list price of $70 has been reduced to $40. See it now on Amazon.To read this article in full or to leave a comment, please click here

Best Deals of the Week, October 31st – November 4th – Deal Alert

Best Deals of the Week, October 31st - November 4thCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted.43% off NETGEAR AC750 WiFi Range ExtenderBoost the range of your existing WiFi and create a stronger signal in hard-to-reach areas with a WiFi range extender like this one from Netgear, which is highly rated and currently discounted 43% on Amazon. . This compact AC750 wall-plug WiFi booster delivers AC dual band WiFi up to 750 Mbps, and is small and discreet, easily blending into your home decor. Well over 13,000 people have reviewed the AC750 on Amazon (read reviews) and have given it an average of 4 out of 5 stars. Right now its list price of $70 has been reduced to $40. See it now on Amazon.To read this article in full or to leave a comment, please click here

BGP Tools for the DFZ (1)

Why isn’t inbound load balancing working the way I expect? Why are users having a hard time reaching my web site? What is that strange advertisement I see in my local routing table, and where does it lead? The Default Free Zone (DFZ), the land where there is no default route from the edge of the Internet to the core, can seem like an intimidating place to work. There are, however, a number of tools that can help you discover what is going on with your routes, where routes are coming from, and other information. This short series of posts will provide an overview of these tools, and some use cases along the way to help you understand how and where to use them.

Note: throughout this series, I’m going to be using the LinkedIn AS number and routes, as well as the AS numbers of other public companies for illustration. I’m deviating from my normal practice of using addresses and AS numbers reserved for documentation in order to make it possible for readers to perform the same actions and get something like the same results. Do not use these addresses or AS numbers in your network!

Let’s start by Continue reading

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Cybersecurity experts stress it would be incredibly difficult to hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Cybersecurity experts stress it would be incredibly difficult to hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here

How to reduce Windows 10’s on-disk footprint

While certain areas of the Windows file structure may be off-limits to direct action — most notably, deleting files inside the C:\Windows (or %windir%) folder — that doesn’t mean that savvy Windows admins and power users can’t selectively prune excess or obsolete files. You just need the right tools.To read this article in full or to leave a comment, please click here(Insider Story)