New products of the week 5.9.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Absolute Endpoint Data Discovery (EDD)Key features: Endpoint Data Discovery (EDD) allows organizations to identify and protect sensitive data stored on an endpoint. More info.To read this article in full or to leave a comment, please click here

5 free/low-cost Wi-Fi analyzers for Windows 10

Inexpensive appsWe’ve reviewed Wi-Fi analyzers that run on Android, Windows, and Mac OS X devices. These apps allow you to analyze the wireless access points and channels on the 2.4 and 5GHz bands. Now we’re reviewing apps, published as Universal Windows Platform apps on the Microsoft Store, that run on Windows 10 PCs, tablets and phones. The Wi-Fi features that developers can utilize in the Universal Windows Platform are still pretty limited. But these apps are inexpensive and/or free. Here are the individual reviews:To read this article in full or to leave a comment, please click here

Windows 10-based Wi-Fi analyzers: No frills, low cost

We’ve reviewed Wi-Fi stumbler and surveying apps that run on Android, Windows, and Mac OS X devices. These apps allow you to analyze the wireless access points and channels on the 2.4 and 5GHz bands in your network. Now we’re reviewing apps, published as Universal Windows Platform apps on the Microsoft Store, which can run on Windows 10 PCs, tablets and phones.To read this article in full or to leave a comment, please click here(Insider Story)

First Bay Area OpenResty Meetup

On March 9, 章亦春, known to most of us as agentzh, organized the first Bay Area OpenResty Meetup at CloudFlare's San Francisco office.

CloudFlare is a big user of Lua, LuaJIT, NGINX and OpenResty and happy to be able to sponsor Yichun's work on this fast, flexible platform.

The slides and videos from the meetup are now available for viewing by people who were unable to be there in person.

abode.io by Dragos Dascalita of Adobe

   

The slides are here.

KONG by Marco Palladino from Mashape

       

The slides can be found here

What's new in OpenResty for 2016 by Yichun Zhang of CloudFlare

       

Yichun's slides are here

If you are interested in being present at the next OpenResty Meetup by sure to follow the meetup itself.

Twitter blocks access to analytics around its data for US intelligence agencies

Twitter has blocked Dataminr from offering analytics around real-time tweets from the social networking site to U.S. intelligence agencies, according to a newspaper report.The social networking company, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies.Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not the want the company to continue providing the service to the agencies, reported The Wall Street Journal on Sunday, quoting a person familiar with the matter.To read this article in full or to leave a comment, please click here

Twitter blocks access to analytics around its data for US intelligence agencies

Twitter has blocked Dataminr from offering analytics around real-time tweets from the social networking site to U.S. intelligence agencies, according to a newspaper report. The social networking company, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies. Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not want the company to continue providing the service to the agencies, reported The Wall Street Journal on Sunday, quoting a person familiar with the matter.To read this article in full or to leave a comment, please click here

Travel Badge of Shame

All frequent flyers strive to the top tier of their program. Qantas Platinum, BA Gold, KrisFlyer Elite Gold, United Premier 1K. They all want that extra level of benefits, those extra upgrades.

But a former manager said:

“You don’t really want to be on the top tier. You want to be on the tier just below, where you get most of the useful benefits like priority check-in, priority luggage, and lounge access. The top tier is actually a badge of shame, because it says you travel too much.”

Well…

IMG_0917.jpg

Yeah. After spending the last few years at AirNZ Gold, I’ve now moved up a level to Elite. Too much travel in the last year, almost all of it in Economy. Four trips to the US, 2 trips to Europe, 2 trips to Australia, plus a few domestic trips. Too damn much.

I don’t think I’ll be able retain it beyond this year. Will have to make the most of it for my upcoming Asia + US trips. Elite Airpoints Dollar Upgrades look like the most useful thing, since the couple of free upgrades get used up pretty quickly. If only I could also use those upgrades on trips to Europe via Asia…

iPhone Rumor Rollup: Things You Can’t Live Without; New life for headphone jack; battery booster

While iPhone users might want it all – thinner, faster, indestructible –iPhone 7 might not quite have all those things, with Apple making the usual trade-offs between power and elegance.BIGGER BATTERY The latest rumors, started via leaked photos on the Chinese Twitter (Weibo), suggest Apple has higher capacity batteries in the works for its next flagship smartphones: we’re talking 1735 mAH and 2810 mAH for the iPhone 7 and 7 Plus vs. 1715 mAH and 2750 mAH for the iPhone 6 and 6 Plus (the 6 and 6 Plus actually had smaller batteries than their predecessors).To read this article in full or to leave a comment, please click here

Are the Panama Papers a problem for you?

On May 9th, The International Consortium of Investigative Journalists will release a searchable database that will detail over 200,000 entities that are part of the Panama Papers investigation.  While this will be intriguing for most of us, if you’re in a financial organization of any kind and there’s the remotest chance that you might have dealings with any of these entities, or with parties who might be fronting for or involved with them, May 9th will be (or depending on when you read this, is or has been), shall we say, “a bad day” for you.To read this article in full or to leave a comment, please click here

Contiv Networking policy Hands-on

Contiv is an Open source project driven primarily by Cisco for policy based networking, storage and cluster management for containerized applications. In this blog, I will cover some of the hands-on stuff that I tried with Contiv Networking. I used the sample examples provided in Contiv documentation as starting point. For Contiv networking basics, you can refer … Continue reading Contiv Networking policy Hands-on

Contiv – Policy based networking for Containers

Contiv is an Open source project driven primarily by Cisco for policy based networking, storage and cluster management for containerized applications. In this blog, I will focus on how Contiv does policy based Container networking. In the next blog, I will cover some hands-on stuff that I tried with Contiv. Container Policy Policies have become critical … Continue reading Contiv – Policy based networking for Containers

Openstack Deployment using Containers

I recently saw the Openstack self-healing demo from CoreOS team using Tectonic(Stackanetes project) and I kind of felt that the boundary between Containers and VMs are blurring. In this blog, I discuss the usecase of deploying Openstack using Containers. We typically think of Openstack as a VM Orchestration tool. Openstack is composed of numerous services … Continue reading Openstack Deployment using Containers

Freaking out over the DBIR

Many in the community are upset over the recent "Verizon DBIR" because it claims widespread exploitation of the "FREAK" vulnerability. They know this is impossible, because of the vulnerability details. But really, the problem lies in misconceptions about how "intrusion detection" (IDS) works. As a sort of expert in intrusion detection (by which, I mean the expert), I thought I'd describe what really went wrong.

First let's talk FREAK. It's a man-in-the-middle attack. In other words, you can't attack a web server remotely by sending bad data at it. Instead, you have to break into a network somewhere and install a man-in-the-middle computer. This fact alone means it cannot be the most widely exploited attack.

Second, let's talk FREAK. It works by downgrading RSA to 512-bit keys, which can be cracked by supercomputers. This fact alone means it cannot be the most widely exploited attack -- even the NSA does not have sufficient compute power to crack as many keys as the Verizon DBIR claim were cracked.

Now let's talk about how Verizon calculates when a vulnerability is responsible for an attack. They use this methodology:
  1. look at a compromised system (identified by AV scanning, IoCs, etc.)
  2. look at Continue reading

29% off Seagate 4TB Portable External Hard Drive with 200GB of Cloud Storage – Deal Alert

The Seagate Backup Plus portable drive offers the mobility of a portable drive with the high capacity of a desktop drive. With this 29% off deal you get a staggering 4TB physical storage + 200GB cloud storage for just $127 (list price $179.99). The unit averages 4.5 out of 5 stars on Amazon from over 7,500 people (read reviews).  To read this article in full or to leave a comment, please click here

Take a look at Boston’s runaway train barreling through two stops without a driver

The Massachusetts Bay Transportation Authority (MBTA) has released surveillance camera video of an unintentionally driverless Red Line train zipping through two commuter stops in December, a potential catastrophe triggered by the operator’s decision to wrap a rubber cord around the vehicle’s accelerator before stepping out to address a signal problem. The train left without him and travelled through a total of four stations before stopping after power was cut to the third rail.While the episode itself was dramatic, to say to the least, the video – even this edited version from WCVB Channel 5 TV -- is underwhelming. Even the people on the platforms didn’t seem to realize anything was wrong.To read this article in full or to leave a comment, please click here