New products of the week 3.7.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.cVu 3240NGKey features: cPacket cVu 3240NG is the most powerful distributed Network Performance Monitoring and Diagnostics (NPMD) solution on the market, delivering proactive real-time analysis, 40G line-rate performance analytics and complete packet inspection across L2-L7. More info.To read this article in full or to leave a comment, please click here

Suspected Bush family hacker Guccifer to be extradited to US

Romania's highest court has approved the temporary extradition of a convicted hacker accused of breaking into the email and social media accounts of a Bush family member and U.S. government officials.The court ruled Friday that Romanian national Marcel Lehel Lazăr will be extradited to the U.S. for a maximum of 18 months to face charges brought against him there.Lazăr was indicted in June 2014 in the U.S. District Court for the Eastern District of Virginia, accused of hacking into the email and social media accounts of high-profile victims including a family member of two former U.S. presidents, a former U.S. Cabinet member, a former member of the U.S. Joint Chiefs of Staff, and a former presidential adviser.To read this article in full or to leave a comment, please click here

The ultimate hackathon survival guide

Name a city, pick a date, and you’ll likely find a nearby hackathon, whether you’re in Des Moines, Iowa, or Yerevan, Armenia.Major League Hacking lists over 100 hackathons held in 2015 at a college or university, while Hacker League lists an additional 200-plus hosted by corporations and other organizations. Some hackathons are virtual and conducted on the Web, and there’s even a three-day event that takes place on a bus.If you’ve never attended one, however, it can seem like a daunting endeavor, with the all-night coding sessions, over-caffeinated attendees, pressure to produce under time constraints and the niggling fear that you’re not skilled enough.To read this article in full or to leave a comment, please click here(Insider Story)

Inside Bank of America’s IT transformation

Over the past decade Bank of America has grown by leaps and bounds internally and through an array of mergers and acquisitions. From a technical standpoint, that growth has created a complex and disparate set of data centers, computing architectures and vendor relationships.For CTO David Reilly, there was an obvious goal: Standardize on more efficient infrastructure. For a company that spends $3 billion on technology each year – nearly double the amount it did five years earlier – any reduced expenditures translate directly to improved bottom line profitability for the bank. Transitioning to a shared virtualized computing platform not only drove savings in the IT organization, but net profit for the bank. But soon Reilly realized that standardizing and virtualizing was not enough. He wanted to start all over again.To read this article in full or to leave a comment, please click here

Apple shuts down first-ever ransomware attack against Mac users

With the help of security researchers, Apple over the weekend quickly blocked a cyberattack aimed at infecting Mac users with file-encrypting malware known as ransomware.The incident is believed to be the first Apple-focused attack using ransomware, which typically targets computers running Windows.Victims of ransomware are asked to pay a fee, usually in bitcoin, to get access to the decryption key to recover their files.Security company Palo Alto Networks wrote on Sunday that it found the "KeRanger" ransomware wrapped into Transmission, which is a free Mac BitTorrent client. Transmission warned on its website that people who downloaded the 2.90 version of the client "should immediately upgrade to 2.92."To read this article in full or to leave a comment, please click here

Docker Security – part 4(Container image)

This is the fourth part of my Docker security series. In this blog, we will cover ways to secure Container images. Following are the other parts (1, 2, 3) Docker image signing: Docker Container images can be stored either in public or private registry. It is needed to sign Container images so that the client knows that image … Continue reading Docker Security – part 4(Container image)

Docker Security – part 3(Engine access)

This is the third part of my Docker security series. In this blog, we will cover ways to securely access Docker engine. Following are the other parts (1, 2, 4) Docker engine access: Docker engine runs as a daemon and by default listens on the Unix socket, “unix:///var/ run/docker.sock”. Docker start options are specified in “/etc/default/docker”. To allow … Continue reading Docker Security – part 3(Engine access)

Docker Security – part 2(Docker Engine)

This is the second part of my Docker security series. In this blog, we will cover security features around Docker engine. Following are the other parts(1, 3, 4) Namespaces: Docker makes use of the following Linux kernel Namespaces to achieve Container isolation: pid namespace mount namespace network namespace ipc namespace UTS namespace To illustrate the … Continue reading Docker Security – part 2(Docker Engine)

Docker Security – part 1(Overview)

There is a general perception that Containers, especially Docker Containers, are insecure. It is true that Containers are not as secure as VM since all Containers in a single machine share the same kernel and compromising one Container can cause host level compromise or compromise with other Containers. There are many ways to harden Containers and … Continue reading Docker Security – part 1(Overview)

February – A busy month indeed!

Wow, what a busy month this has been!

So I started my new job on February 1st and thus far, everything has been really great.
My new coworkers are very friendly and helpful.

I’ve spent the better part of february, trying to get to grips with the SP network I will be focusing on from now on. Im still not where I want to be yet, but im getting there. One of the guys I will be working very closely with, started cleaning up the network when he was hired 9 months ago and he’s done a really great job with what he’s had to work with.

There are still some work to be done however, which is the very reason they have hired me and another very good friend of mine. A well run network is a dynamic beast which needs to be tamed. On top of that, the company growth has been around 30% a year, so alot of structure and processes needs to come with that growth, which is where I can really make a difference.

I’ve also had the good fortune of being selected as a 2016 Cisco Champion, which was a very nice surprise. I Continue reading

OpenStack on one machine

To learn more about OpenStack cloud management software, a student or research may install OpenStack on a single machine, such as a laptop computer or a virtual machine, and emulate a small datacenter using virtual machines or containers.

Researchers and students may choose from multiple projects that will set up OpenStack on a single machine. Some projects are community-based open-source projects and others are vendor supported projects (while still nominally open-source).

This post is an overview of links and resources to installing OpenStack on one machine.

DevStack

DevStack is a community-driven open-source project that provides scripts and drivers to install OpenStack on a single machine. It includes direction to install on a laptop computer and to install on a single virtual machine. Devstack may also be configured to use LXC containers as compute nodes, or to use nested KVM virtualization for compute nodes.

OpenStack AutoPilot

Openstack Autopilot is the Ubuntu OpenStack installer. It is free as long as you use less than ten machines in your cloud infrastructure. So, most students and researchers will be able to play around with Autopilot for free.

Autopilot will set up an OpenStack cloud using LXD containers. This means that the system can Continue reading