Ethernet-over-VPN: What Could Possibly Go Wrong?

One of my readers sent me a link to SoftEther, a VPN solution that

[…] penetrates your network admin's troublesome firewall for overprotection. […] Any deep-packet inspection firewalls cannot detect SoftEther VPN's transport packets as a VPN tunnel, because SoftEther VPN uses Ethernet over HTTPS for camouflage.

What could possibly go wrong with such a great solution?

Read more ...

PS Core Network Concepts

Most of the educational documents related to PS Core Network start with Call Flows. Attach Call Flow, PDP Context, Paging, etc. Basically that was my problem when I started working in PS Core because the Call Flows include a lot of messages which in turn include a lot of parameters and Information Elements so starting with […]

The post PS Core Network Concepts appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Attackers launch multi-vector DDoS attacks that use DNSSEC amplification

DDoS attacks are becoming increasingly sophisticated, combining multiple attack techniques that require different mitigation strategies, and abusing new protocols.Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that peaked at 363G bps (bits per second) and 57 million packets per second.While the size itself was impressive and way above what a single organization could fight off on its own, the attack also stood out because it combined six different techniques, or vectors: DNS reflection, SYN flood, UDP fragment, PUSH flood, TCP flood, and UDP flood.Almost 60 percent of all DDoS attacks observed during the first quarter of this year were multi-vector attacks, Akamai said in a report released last month. The majority of them used two vectors, and only 2 percent used five or more techniques.To read this article in full or to leave a comment, please click here

Attackers launch multi-vector DDoS attacks that use DNSSEC amplification

DDoS attacks are becoming increasingly sophisticated, combining multiple attack techniques that require different mitigation strategies, and abusing new protocols.Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that peaked at 363G bps (bits per second) and 57 million packets per second.While the size itself was impressive and way above what a single organization could fight off on its own, the attack also stood out because it combined six different techniques, or vectors: DNS reflection, SYN flood, UDP fragment, PUSH flood, TCP flood, and UDP flood.Almost 60 percent of all DDoS attacks observed during the first quarter of this year were multi-vector attacks, Akamai said in a report released last month. The majority of them used two vectors, and only 2 percent used five or more techniques.To read this article in full or to leave a comment, please click here

Attackers launch multi-vector DDoS attacks that use DNSSEC amplification

DDoS attacks are becoming increasingly sophisticated, combining multiple attack techniques that require different mitigation strategies, and abusing new protocols.Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that peaked at 363G bps (bits per second) and 57 million packets per second.While the size itself was impressive and way above what a single organization could fight off on its own, the attack also stood out because it combined six different techniques, or vectors: DNS reflection, SYN flood, UDP fragment, PUSH flood, TCP flood, and UDP flood.Almost 60 percent of all DDoS attacks observed during the first quarter of this year were multi-vector attacks, Akamai said in a report released last month. The majority of them used two vectors, and only 2 percent used five or more techniques.To read this article in full or to leave a comment, please click here

​EMC targets strategic markets as Dell acquisition looms

EMC has reported encouraging financials ahead of the company’s crucial shareholder vote this week, as the vendor targets strategic markets and profitability ahead of its upcoming acquisition by Dell. With the largest technology merger in history pending approval, the storage giant reported strategic successes during 2Q16 that it can build from as it continues toward its landmark expected integration into Dell. After a full year of bottom-line declines during 2015, EMC notched a second consecutive quarter of year-to-year net income improvements during 2Q16, rising 160 basis points to 9.7 per cent, supported in part by cost restructuring initiatives but also by heightened monetisation of investment in strategic solutions areas.To read this article in full or to leave a comment, please click here

Light Posting Week—IETF in Berlin

Y’all—I’m in Berlin at the IETF this week, so I won’t be posting as many “long articles” as usual. I will have my usual slate of worth reading/etc. If anyone has questions about the IETF they’d like answered, feel free to comment here… I should be back to some state closer to normal next week, but between Live last week and the IETF this week, I’ve just not had my normal dose of “writing time” to work with.

LinkedInTwitterGoogle+Facebook

The post Light Posting Week—IETF in Berlin appeared first on 'net work.

IBM grows in cloud and data analytics but overall revenue slides

IBM’s revenue continued to decline in the second quarter but growth in some of its strategic initiatives like cloud computing and data analytics suggest that the company may be on track in its transition plans.The Armonk, New York, company said Monday that revenue from its new “strategic imperatives” like cloud, analytics and security increased by 12 percent year-on-year to US$8.3 billion. That increase was, however, lower than the growth the company had reported in these businesses in the first quarter.Cloud revenue – public, private and hybrid – grew 30 percent in the second quarter, while revenue from analytics grew 4 percent, revenue from mobile increased 43 percent and the security business grew 18 percent.To read this article in full or to leave a comment, please click here

IBM grows in cloud and data analytics but overall revenue slides

IBM’s revenue continued to decline in the second quarter but growth in some of its strategic initiatives like cloud computing and data analytics suggest that the company may be on track in its transition plans.The Armonk, New York, company said Monday that revenue from its new “strategic imperatives” like cloud, analytics and security increased by 12 percent year-on-year to US$8.3 billion. That increase was, however, lower than the growth the company had reported in these businesses in the first quarter.Cloud revenue – public, private and hybrid – grew 30 percent in the second quarter, while revenue from analytics grew 4 percent, revenue from mobile increased 43 percent and the security business grew 18 percent.To read this article in full or to leave a comment, please click here

How AT&T wants to use AI as a crystal ball

AT&T uses artificial intelligence to tell if things are going wrong in its network. Soon, AI may know it before it happens.The carrier says it’s been using AI for decades in areas like call-center automation but developed it for each use as they came along. Now AT&T is pouring its AI smarts into a one platform that can be used with multiple applications.“I can’t just keep doing this once at a time. We need a foundation,” said Mazin Gilbert, assistant vice president of the company’s Inventive Sciences division, in an interview last week at the AT&T Shape conference in San Francisco.That foundation is about two million lines of the code that powers AT&T’s Domain 2.0 software-defined network, which the carrier built so it could roll out new services more quickly and efficiently. Along with its own AI code, much of which is open source, the company is using open-source components from partners including universities and third-party vendors.To read this article in full or to leave a comment, please click here

How AT&T wants to use AI as a crystal ball

AT&T uses artificial intelligence to tell if things are going wrong in its network. Soon, AI may know it before it happens.The carrier says it’s been using AI for decades in areas like call-center automation but developed it for each use as they came along. Now AT&T is pouring its AI smarts into a one platform that can be used with multiple applications.“I can’t just keep doing this once at a time. We need a foundation,” said Mazin Gilbert, assistant vice president of the company’s Inventive Sciences division, in an interview last week at the AT&T Shape conference in San Francisco.That foundation is about two million lines of the code that powers AT&T’s Domain 2.0 software-defined network, which the carrier built so it could roll out new services more quickly and efficiently. Along with its own AI code, much of which is open source, the company is using open-source components from partners including universities and third-party vendors.To read this article in full or to leave a comment, please click here

How AT&T wants to use AI as a crystal ball

AT&T uses artificial intelligence to tell if things are going wrong in its network. Soon, AI may know it before it happens.The carrier says it’s been using AI for decades in areas like call-center automation but developed it for each use as they came along. Now AT&T is pouring its AI smarts into a one platform that can be used with multiple applications.“I can’t just keep doing this once at a time. We need a foundation,” said Mazin Gilbert, assistant vice president of the company’s Inventive Sciences division, in an interview last week at the AT&T Shape conference in San Francisco.That foundation is about two million lines of the code that powers AT&T’s Domain 2.0 software-defined network, which the carrier built so it could roll out new services more quickly and efficiently. Along with its own AI code, much of which is open source, the company is using open-source components from partners including universities and third-party vendors.To read this article in full or to leave a comment, please click here

How a healthcare hacker is pressuring victims to pay up

Pay up or face your patients' wrath.That’s how one hacker is trying to shake down U.S. healthcare providers after stealing sensitive data about their patients.TheDarkOverlord claims to have stolen 10 million patient records and is selling them on the black market. In the meantime, the hacker is trying to extort the providers by telling them their patient data won't be sold if they pay a ransom.At least one of the healthcare providers so far has refused to give in, TheDarkOverlord said in an interview Friday. To apply pressure, the hacker claims to have called some of its patients to warn them their records will be leaked if the provider doesn't pay up.To read this article in full or to leave a comment, please click here

How a healthcare hacker is pressuring victims to pay up

Pay up or face your patients' wrath.That’s how one hacker is trying to shake down U.S. healthcare providers after stealing sensitive data about their patients.TheDarkOverlord claims to have stolen 10 million patient records and is selling them on the black market. In the meantime, the hacker is trying to extort the providers by telling them their patient data won't be sold if they pay a ransom.At least one of the healthcare providers so far has refused to give in, TheDarkOverlord said in an interview Friday. To apply pressure, the hacker claims to have called some of its patients to warn them their records will be leaked if the provider doesn't pay up.To read this article in full or to leave a comment, please click here