Absorbing DDoS with Communities

Distributed Denial of Service attacks can damage your business—and they can be difficult to manage or counter. While there are a number of tools available to counter DDoS attacks, particularly in the commercial space, and there are a number of widely available DDoS protection services, sometimes it’s useful to know how to counter a DDoS on your own. One option is to absorb attacks across a broader set of inbound nodes. Let’s use the network below to illustrate (though often the scale needs to be quite a bit larger for this solution to be useful in the real world).

ddos-spreading

Assume, for the moment, that the attacker is injecting a DDoS stream from the black hat, sitting just behind AS65004. There are customers located in AS65001, 2, 3, 4, and 5. For whatever reason, the majority of the attacker’s traffic is coming in to site C, through AS65003. Normally this is a result of an anycast based service (such as active-active data centers, or a web based service, or a DNS service), combined with roughly geographical traffic patterns. Even a DDoS attack from a mid sized or large’ish botnet, or reflection off a set of DNS servers, can end up being Continue reading

4 signs it’s time to look for a new job

Everyone has a bad day at work now and then, but when those bad days start to outnumber the good ones, it’s time to consider looking for a new job. As the economy continues to improve, there’s no reason to stay with a company that’s struggling to survive, or to settle for a role in which you’re not happy, says Howard Seidel, Partner at executive leadership and career consulting firm Essex Partners.To read this article in full or to leave a comment, please click here(Insider Story)

4 tools for managing firewall rules

Firewall devices are only as good as the hundreds, or even thousands, rules that govern them. Misconfigurations, unused rules and conflicting rules can cause firewalls to fail in their crucial missions. Firewall security management products can help security managers monitor compliance, orchestrate device policies, optimize rules and manage firewall changes.To read this article in full or to leave a comment, please click here(Insider Story)

4 tools for managing firewall rules

Firewall devices are only as good as the hundreds, or even thousands, rules that govern them. Misconfigurations, unused rules and conflicting rules can cause firewalls to fail in their crucial missions. Firewall security management products can help security managers monitor compliance, orchestrate device policies, optimize rules and manage firewall changes. According to the IT Central Station user community, the most important criteria to consider when choosing firewall security management software are visibility for network devices, scalability, and ensured security and compliance.To read this article in full or to leave a comment, please click here(Insider Story)

27% off Canon EOS Rebel T6 Digital SLR Camera Kit with EF-S 18-55mm and EF 75-300mm Zoom Lenses – Deal Alert

The 18.0 megapixel Canon EOS Rebel T6 Digital SLR Camera Kit is currently discounted by 27% on Amazon from $749.99 down to $549.  The complete bundle includes EF-S 18-55mm and EF 75-300mm Zoom Lenses.  It also has built-in Wi-Fi and NFC connectivity, providing easy sharing to compatible smart devices, select social media sites and the Canon Connect Station CS100 device.To read this article in full or to leave a comment, please click here

iOS 10 on the iPad Pro: The 8 features you need to know

The iPad Pro is a productivity powerhouse—or at least, that’s what Apple wants it to be. The 12.9-inch Pro was released last November, and the 9.7-inch model debuted in March, so we weren’t expecting to see any new hardware at Apple’s Worldwide Developers Conference in June. But we were hoping Apple would add some iPad-only features in iOS 10 that would fix a few problems and make the Pros even more awesome, or at least show off some new partner apps that take advantage of all that screen real estate.Alas, the iPad was a footnote in iOS 10’s parade of features. The device gets most of the good stuff, like the revamped Messages app, a new lock screen with rich notifications, and smarter Photos, but the iPad-only tweaks are just that: minor changes.To read this article in full or to leave a comment, please click here

Researchers add software bugs to reduce the number of… software bugs

Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities.The idea is to insert a known quantity of vulnerabilities into code, then see how many of them are discovered by bug-finding tools.By analyzing the reasons bugs escape detection, developers can create more effective bug-finders, according to researchers at New York University in collaboration with others from MIT’s Lincoln Laboratory and Northeastern University.They created large-scale automated vulnerability addition (LAVA), which is a low-cost technique that adds the vulnerabilities. “The only way to evaluate a bug finder is to control the number of bugs in a program, which is exactly what we do with LAVA,” says Brendan Dolan-Gavitt, a computer science and engineering professor at NYU’s Tandon School of Engineering.To read this article in full or to leave a comment, please click here

Researchers add software bugs to reduce the number of… software bugs

Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities.The idea is to insert a known quantity of vulnerabilities into code, then see how many of them are discovered by bug-finding tools.By analyzing the reasons bugs escape detection, developers can create more effective bug-finders, according to researchers at New York University in collaboration with others from MIT’s Lincoln Laboratory and Northeastern University.They created large-scale automated vulnerability addition (LAVA), which is a low-cost technique that adds the vulnerabilities. “The only way to evaluate a bug finder is to control the number of bugs in a program, which is exactly what we do with LAVA,” says Brendan Dolan-Gavitt, a computer science and engineering professor at NYU’s Tandon School of Engineering.To read this article in full or to leave a comment, please click here

Stretching Software Across Future Exascale Systems

If money was no object, then arguably the major nations of the world that always invest heavily in supercomputing would have already put an exascale class system into the field. But money always matters and ultimately supercomputers have to justify their very existence by enabling scientific breakthroughs and enhancing national security.

This, perhaps, is why the Exascale Computing Project establish by the US government last summer is taking such a measured pace in fostering the technologies that will ultimately result in bringing three exascale-class systems with two different architectures into the field after the turn of the next decade. The

Stretching Software Across Future Exascale Systems was written by Timothy Prickett Morgan at The Next Platform.

IDG Contributor Network: Cajun redux? Avaya’s focus on data networking misses the mark

While channel surfing recently I landed on a reality TV show where people bid on abandoned homes without knowing what’s inside. Occasionally, something of true value is found—maybe even something that might make the new owners wealthy. One might say that something like this happened when Avaya acquired Nortel Enterprise Solutions (NES) in 2009.Comparatively, Avaya inherited rooms upon rooms where old Aunt Norty had stashed the detritus of her life. There were, however, many treasures. One find, known today as the company’s SDN Fx™ Architecture, might be compared to a Picasso found stashed away in the attic. That’s the good news.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cajun redux? Avaya’s focus on data networking misses the mark

While channel surfing recently I landed on a reality TV show where people bid on abandoned homes without knowing what’s inside. Occasionally, something of true value is found—maybe even something that might make the new owners wealthy. One might say that something like this happened when Avaya acquired Nortel Enterprise Solutions (NES) in 2009.Comparatively, Avaya inherited rooms upon rooms where old Aunt Norty had stashed the detritus of her life. There were, however, many treasures. One find, known today as the company’s SDN Fx™ Architecture, might be compared to a Picasso found stashed away in the attic. That’s the good news.To read this article in full or to leave a comment, please click here

Check this out: Walmart Pay for iOS & Android can now be used in all of retailer’s US stores

The following email subject lines appeared in my inbox on Wednesday just a couple of hours apart:* Walmart Pay Now Available in all Walmart Stores Nationwide (from Walmart PR)* Map of Walmart store closings (from a market research firm making a larger point about rapid changes in retail and consumer packaged goods markets) My first thought, upon noticing the juxtaposition, was well, having 154 fewer stores in the US this year probably made it easier for Walmart to roll out its mobile payment app nationwide.MORE: 7 reasons mobile payments still aren't mainstreamTo read this article in full or to leave a comment, please click here

Check this out: Walmart Pay for iOS & Android can now be used in all of retailer’s US stores

The following email subject lines appeared in my inbox on Wednesday just a couple of hours apart:* Walmart Pay Now Available in all Walmart Stores Nationwide (from Walmart PR)* Map of Walmart store closings (from a market research firm making a larger point about rapid changes in retail and consumer packaged goods markets) My first thought, upon noticing the juxtaposition, was well, having 154 fewer stores in the US this year probably made it easier for Walmart to roll out its mobile payment app nationwide.MORE: 7 reasons mobile payments still aren't mainstreamTo read this article in full or to leave a comment, please click here

Here’s how secret voice commands could hijack your smartphone

Kitten videos are harmless, right? Except when they take over your phone. Researchers have found something new to worry about on the internet. It turns out that a muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it. The researchers describe the threat in a research paper to be presented next month at the USENIX Security Symposium in Austin, Texas. They also demonstrate it in this video. Voice recognition has taken off quickly on phones, thanks to services like Google Now and Apple's Siri, but voice software can also make it easier to hack devices, warned Micah Sherr, a Georgetown University professor and one of the paper’s authors.To read this article in full or to leave a comment, please click here

Here’s how secret voice commands could hijack your smartphone

Kitten videos are harmless, right? Except when they take over your phone. Researchers have found something new to worry about on the internet. It turns out that a muffled voice hidden in an innocuous YouTube video could issue commands to a nearby smartphone without you even knowing it. The researchers describe the threat in a research paper to be presented next month at the USENIX Security Symposium in Austin, Texas. They also demonstrate it in this video. Voice recognition has taken off quickly on phones, thanks to services like Google Now and Apple's Siri, but voice software can also make it easier to hack devices, warned Micah Sherr, a Georgetown University professor and one of the paper’s authors.To read this article in full or to leave a comment, please click here

DockerCon 2016 Videos: Black Belt Track

Videos from the Black Belt track at DockerCon 2016 are now posted online!

Black Belt talks are advanced technical deep dives presented by Docker experts. These sessions are code and demo heavy and light on the slides. From Docker internals to advanced container orchestration, security and networking, this track should delight most container ninjas.

Watch all of the sessions from the Black Belt track below or head to YouTube for the DockerCon 2016 playlist to watch more talks from the conference.


 

The Golden Ticket: Docker and High Security Microservices by Aaron Grattafiori



Check out the slides + video of @dyn___’s #DockerCon talk on #Docker security + #microservices
Click To Tweet



 

Cloning Running Servers with Docker and CRIU by Ross Boucher, Playground Theory



Learn about cloning running servers with #Docker and #CRIU by watching @boucher’s #DockerCon talk
Click To Tweet



 

Docker for Mac and Windows: The Insider’s Guide by Justin Cormack, Docker



Watch @justincormack’s #DockerCon talk for the inside scoop on #Docker for Mac and Windows
Click To Tweet



 

Containerd: Building a Container Supervisor by Michael Crosby, Docker



Watch @crosbymichael’s session on the #Docker ecosystem & lifecycle at #DockerCon 2016
Click To Tweet



 

Continue reading

Support from the Source: Getting Official Docker Support

Docker is the open platform to build, ship and run any application, anywhere. Whether legacy or microservices, Linux or Windows, Docker provides an OS, infrastructure and application architecture agnostic platform for developers and IT organizations to accelerate their application pipeline. Organizations often look for additional tooling and support as they look to bring Dockerized applications into production with SLAs that mirror their own service level commitments to their customers. Docker is available as free open source software or combined with commercial support with enterprise class service levels.

 

Open Source Support

The Docker team and community collaborate together to release updates to the Docker Engine and other related projects every couple of months. Open source support for the Docker Engine is provided through IRC, GitHub, and Docker Forums for the latest released version of Docker software. Any bugs and issues are filed, in the open, to the Docker repo for contributors and maintainers to ask for more information and discuss resolutions. Fixes and patches are then applied and released as incremental versions to the upstream Docker software.

 

Docker Commercial Support

Docker also provides commercial support for the upstream Docker Engine software directly and through authorized support partners. Commercial Continue reading