22% off SanDisk Connect Wireless Stick 200GB – Deal Alert

The SanDisk Connect wireless stick is a flash drive with a unique twist -- you can access it wirelessly. Whether it's in your pants pocket, in your bag, or on the picnic table at your campsite, the Connect wireless stick lets you stream media or move files wirelessly with up to three computers, phones or tablets simultaneously. Connections are made via built-in wifi (think "hotspot"), so no external wireless or internet services are needed. A USB connection is also available, if desired. Storage on this model is a generous 200GB. Reviewers on Amazon report at least 8-10 hours of battery life on one charge. This model is currently discounted 22% down to $93.56. Learn more and review buying options now on Amazon.To read this article in full or to leave a comment, please click here

22% off SanDisk Connect Wireless Stick 200GB – Deal Alert

The SanDisk Connect wireless stick is a flash drive with a unique twist -- you can access it wirelessly. Whether it's in your pants pocket, in your bag, or on the picnic table at your campsite, the Connect wireless stick lets you stream media or move files wirelessly with up to three computers, phones or tablets simultaneously. Connections are made via built-in wifi (think "hotspot"), so no external wireless or internet services are needed. A USB connection is also available, if desired. Storage on this model is a generous 200GB. Reviewers on Amazon report at least 8-10 hours of battery life on one charge. This model is currently discounted 22% down to $93.56. Learn more and review buying options now on Amazon.To read this article in full or to leave a comment, please click here

The Mad Max DGA

This post describes a domain generation algorithm (DGA) used by the “Mad Max” malware family. Mad Max is a targeted trojan, and we plan to post a follow-up article that documents our findings regarding the features of the Mad Max malware itself. But for now we will focus on the reversing of its DGA, since […]

9 big moments in Yahoo’s troubled history

Yahoo is founded in 1994Image by JD Lasica/FlickrIn early 1994, Stanford University grad students Jerry Yang and David Filo launch the website, Jerry and David's Guide to the World Wide Web. Within months, they rename it Yahoo.Yahoo goes public with huge stock gainsImage by Yahoo/FlickrTo read this article in full or to leave a comment, please click here

snaproute Go BGP Code Dive (5): Starting a Peer

Last time we looked at the snaproute BGP code, we discovered the peer bringup process is a finite state machine. With this in mind, let’s try to unravel the state machine into a set of calls, beginning from our original starting point, a debug message that prints on the screen when a new peering relationship is established. The key word in the debug message was ConnEstablished, which led to:

func (fsm *FSM) ConnEstablished() {
fsm.logger.Info(fmt.Sprintln("Neighbor:", fsm.pConf.NeighborAddress, "FSM", fsm.id, "ConnEstablished - start"))
fsm.Manager.fsmEstablished(fsm.id, fsm.peerConn.conn)
fsm.logger.Info(fmt.Sprintln("Neighbor:", fsm.pConf.NeighborAddress, "FSM", fsm.id, "ConnEstablished - end"))
}

From here, we searched for calls to ConnEstablished, and found—

func (fsm *FSM) ChangeState(newState BaseStateIface) {
...
if oldState == BGPFSMEstablished && fsm.State.state() != BGPFSMEstablished {
fsm.ConnBroken()
} else if oldState != BGPFSMEstablished && fsm.State.state() == BGPFSMEstablished {
fsm.ConnEstablished()
}
}

Looking for ChangeState leads us to a lot of different calls, but only one that seems to relate to establishing a new peer, as evidenced by a state that relates to established in some way. This, in turn, leads to—

func (st *OpenConfirmState) processEvent(event BGPFSMEvent, data Continue reading

6 Slack alternatives worth a look

Once upon a time if you wanted employees to collaborate you'd probably encourage them to use Internet Relay Chat (IRC). But about three years ago Slack appeared on the scene, and since then it's been eating IRC's lunch. That's because it's much easier to install, get up and running, and use than IRC, making it massively popular with nontechies. And thanks to a well-documented API it's easy to integrate with other programs and services. That means it's customizable and infinitely extensible, which makes it popular with developers.To read this article in full or to leave a comment, please click here(Insider Story)

Businesses failing to secure privileged accounts

Most companies fail to secure the "keys to the kingdom," according to a new benchmark survey .Last week, privileged account management (PAM) specialist Thycotic and research firm Cybersecurity Ventures released their 2016 State of Privileged Account Management security report, based on the responses of more than 500 IT security professionals who have participated in the Privileged Password Vulnerability Benchmark survey to date.High priority, low compliance While 80 percent of respondents indicated PAM security is a high priority for their organizations, and 60 percent said PAM security is required to demonstrate compliance with government regulations, 52 percent of participants received a failing grade on enforcement of proper privileged credential controls.To read this article in full or to leave a comment, please click here

Businesses failing to secure privileged accounts

Most companies fail to secure the "keys to the kingdom," according to a new benchmark survey .Last week, privileged account management (PAM) specialist Thycotic and research firm Cybersecurity Ventures released their 2016 State of Privileged Account Management security report, based on the responses of more than 500 IT security professionals who have participated in the Privileged Password Vulnerability Benchmark survey to date.High priority, low compliance While 80 percent of respondents indicated PAM security is a high priority for their organizations, and 60 percent said PAM security is required to demonstrate compliance with government regulations, 52 percent of participants received a failing grade on enforcement of proper privileged credential controls.To read this article in full or to leave a comment, please click here

Low-speed Ethernet champions set plugfest ahead of new net standard

Hand-in-hand with the forthcoming adoption of a low-speed Ethernet standard by the IEEE, proponents of the technology will hold an interoperability plugfest in October to tout the readiness of 2.5GBASE-T and 5GBASE-T products.The new specification -- IEEE P802.3bz – defines 2.5GBASE-T and 5GBASE-T, significantly boosting the speed of traditional Ethernet without requiring the tearing out of current cabling.+More on Network World: Ethernet everywhere!+Perhaps most significantly 2.5GbE and 5GbE will allow connectivity to 802.11ac Wave 2 Access Points, considered by many to be the real driving force behind bringing up the speed of traditional NBase-T products.To read this article in full or to leave a comment, please click here

Low-speed Ethernet champions set plugfest ahead of new net standard

Hand-in-hand with the forthcoming adoption of a low-speed Ethernet standard by the IEEE, proponents of the technology will hold an interoperability plugfest in October to tout the readiness of 2.5GBASE-T and 5GBASE-T products.The new specification -- IEEE P802.3bz – defines 2.5GBASE-T and 5GBASE-T, significantly boosting the speed of traditional Ethernet without requiring the tearing out of current cabling.+More on Network World: Ethernet everywhere!+Perhaps most significantly 2.5GbE and 5GbE will allow connectivity to 802.11ac Wave 2 Access Points, considered by many to be the real driving force behind bringing up the speed of traditional NBase-T products.To read this article in full or to leave a comment, please click here

Yahoo’s homepage through the years

A look backImage by YahooWith Yahoo’s sale to Verizon for $4.8 billion confirmed this morning, the Wayback Machine offers us an opportunity to see how one of the Internet’s most iconic address – www.yahoo.com – has evolved over the years.To read this article in full or to leave a comment, please click here

Devices with Qualcomm modems safe from critical ASN.1 telecom flaw

Despite initial concerns, smartphones equipped with Qualcomm modems are not vulnerable to a recently announced vulnerability that could potentially allow attackers to take over cellular network gear and consumer mobile devices. The vulnerability was discovered in ASN1C, a popular compiler that produces C code for parsing ASN.1 encoded data. Abstract Syntax Notation One (ASN.1) is a standard for representing, encoding, transmitting, and decoding data in telecommunications and computer networking. Many devices, from mobile phones to switching equipment inside cellular infrastructure parse ASN.1 data and do so using programs that were created by compilers such as ASN1C, which is developed by U.S.-based Objective Systems.To read this article in full or to leave a comment, please click here

Devices with Qualcomm modems safe from critical ASN.1 telecom flaw

Despite initial concerns, smartphones equipped with Qualcomm modems are not vulnerable to a recently announced vulnerability that could potentially allow attackers to take over cellular network gear and consumer mobile devices. The vulnerability was discovered in ASN1C, a popular compiler that produces C code for parsing ASN.1 encoded data. Abstract Syntax Notation One (ASN.1) is a standard for representing, encoding, transmitting, and decoding data in telecommunications and computer networking. Many devices, from mobile phones to switching equipment inside cellular infrastructure parse ASN.1 data and do so using programs that were created by compilers such as ASN1C, which is developed by U.S.-based Objective Systems.To read this article in full or to leave a comment, please click here

IDG Contributor Network: OK — What is this Nano Server in Windows Server 2016?

Nano is a prefix that means small, really small. Maybe even microscopic small. So that means we know right away Nano Server is very small version of Windows Server 2016. But wait, didn’t we already have that with Windows Server 2012 Core. Nano Server is a nice GUI-less version of the server technology.+ Also on Network World: Is Windows Nano Server a data center game-changer? +Nano makes Server Core look bloated and massive. Don’t believe me? Let’s looks at some numbers.The full GUI Server version of Windows Server has required the following:To read this article in full or to leave a comment, please click here

Five years until transistors stop shrinking, predicts last Moore’s Law roadmap

Moore’s Law, which says the number of transistors within an integrated circuit will double every two years, had a good long run but its end may be near – very near – potentially a mere five years away. By 2021, even if chip makers could further shrink and add more transistors, the high cost of manufacturing would make it financially impractical.That’s not the only problem, according to the last installment of the International Technology Roadmap for Semiconductors 2.0 (pdf).By 2020 to 2025, it will be “practically impossible” to reduce device dimensions. While one solution is to stack the transistors, it can’t get so hot that it burns up either.To read this article in full or to leave a comment, please click here