IT salaries increase across 12 tech job categories

Salaries increase across 12 tech job categoriesImage by ThinkstockMondo's 2016-2017 IT Salary Guide points to steady increases in tech salaries across 12 verticals. The study points out that as technology influences every industry, the demand for STEM workers is only going to increase, with a projected 1.5 million open positions in STEM by the year 2020. If you are already in the technology field, or are hoping to break into it, it couldn't be a better time. Mondo tracks the salaries of popular technology jobs to see how the annual compensation range increases year over year and this most recent report shows increases in nearly every tech job evaluated; and for jobs that didn't increase in this report, they at least didn't show a decline in average salary either. DevOps/SDNImage by ThinkstockTo read this article in full or to leave a comment, please click here

This tool can block ransomware on Mac OS X, for now

A security researcher has created a free security tool that can detect attempts by ransomware programs to encrypt files on users' Macs and then block them before they do a lot of damage.Called RansomWhere? the application is the creation of Patrick Wardle, director of research and development at security firm Synack. It's meant to detect and block the encryption of files by untrusted processes.The tool monitors users' home directories and detects when encrypted files are rapidly created inside them -- a telltale sign of ransomware activity.When such activity is detected, RansomWhere? determines the process responsible and suspends it. To limit false positives -- legitimate encryption programs being detected as ransomware -- the tool whitelists all applications signed by Apple and most of those that already exist on the computer when RansomWhere? is first installed.To read this article in full or to leave a comment, please click here

This tool can block ransomware on Mac OS X, for now

A security researcher has created a free security tool that can detect attempts by ransomware programs to encrypt files on users' Macs and then block them before they do a lot of damage.Called RansomWhere? the application is the creation of Patrick Wardle, director of research and development at security firm Synack. It's meant to detect and block the encryption of files by untrusted processes.The tool monitors users' home directories and detects when encrypted files are rapidly created inside them -- a telltale sign of ransomware activity.When such activity is detected, RansomWhere? determines the process responsible and suspends it. To limit false positives -- legitimate encryption programs being detected as ransomware -- the tool whitelists all applications signed by Apple and most of those that already exist on the computer when RansomWhere? is first installed.To read this article in full or to leave a comment, please click here

Jenkins as system job scheduler

Jenkins is an open software tool, typically used for continuous integration in software development. Network or system changes can be treated in a similar way as code changes are: developed, tested and deployed. Test frameworks are coming  to Network world (look at TODD) but are not popular yet.  Even without unit tests we can still use developer tools like Jenkins […]

The post Jenkins as system job scheduler appeared first on Packet Pushers.

Jenkins as system job scheduler

Jenkins is an open software tool, typically used for continuous integration in software development. Network or system changes can be treated in a similar way as code changes are: developed, tested and deployed. Test frameworks are coming  to Network world (look at TODD) but are not popular yet.  Even without unit tests we can still use developer tools like Jenkins […]

The post Jenkins as system job scheduler appeared first on Packet Pushers.

Enhanced Disaster Recovery with Cross-VC NSX and SRM

Check-out the new Disaster Recovery with NSX and SRM white paper that explains how Cross-VC NSX + VMware’s SRM offers an Enhanced Disaster Recovery (DR) solution and solves many of the challenges related to traditional DR solutions. This solution provides consistent logical networking and security across protected and recovery sites and faster recovery upon disaster scenarios. A summary and overview of the solution is provided below.  Continue reading

SpyEye botnet kit developer sentenced to long jail term

Aleksandr Andreevich Panin, the Russian developer of the SpyEye botnet creation kit, and an associate were on Wednesday sentenced to prison terms by a court in Atlanta, Georgia, for their role in developing and distributing malware that is said to have caused millions of dollars in losses to the financial sector.Panin, who set out to develop SpyEye as a successor to the Zeus malware that affected financial institutions since 2009, was sentenced by the court to nine and half years in prison, while his Algerian associate Hamza Bendelladj got a 15-year term, according to the Department of Justice.After infecting victims' computers, cybercriminals were able to remotely control these compromised computers through command-and-control servers, and steal the victims’ personal and financial information using techniques such as Web injects that introduce malicious code into a victim’s browser, keystroke loggers that record keyboard activity and credit card grabbers. The information sent to the servers was then used to steal money from the financial accounts of the victims.To read this article in full or to leave a comment, please click here

SpyEye botnet kit developer sentenced to long jail term

Aleksandr Andreevich Panin, the Russian developer of the SpyEye botnet creation kit, and an associate were on Wednesday sentenced to prison terms by a court in Atlanta, Georgia, for their role in developing and distributing malware that is said to have caused millions of dollars in losses to the financial sector.Panin, who set out to develop SpyEye as a successor to the Zeus malware that affected financial institutions since 2009, was sentenced by the court to nine and half years in prison, while his Algerian associate Hamza Bendelladj got a 15-year term, according to the Department of Justice.After infecting victims' computers, cybercriminals were able to remotely control these compromised computers through command-and-control servers, and steal the victims’ personal and financial information using techniques such as Web injects that introduce malicious code into a victim’s browser, keystroke loggers that record keyboard activity and credit card grabbers. The information sent to the servers was then used to steal money from the financial accounts of the victims.To read this article in full or to leave a comment, please click here

Apple running a secret car design lab in Germany, report claims

Rumors of Apple's interest in developing an electric car have persisted for months now. Over the last 12 months, we've heard rumblings that Apple's car development team is almost 1,000 engineers and researchers deep. What's more, it's no secret that Apple has poached a number of employees from high-end luxury automakers such as BMW, Porsche, and of course Tesla.Now whether or not an Apple Car actually sees the light of day is another matter altogether, but it's impossible to ignore that Apple is seriously exploring such a possibility. The latest report about Apple's car plans comes to us courtesy of the German-language Frankfurter Allgemeine Zeitung (F.A.Z) which relays that Apple has a secret auto-oriented research facility in Germany where a team of 15-20 employees with deep experience across all facets of the car design and manufacturing process come up with new and interesting ideas. Specifically, the employees are said to be "progressive thinkers" with backgrounds in engineering, software and hardware design, and sales.To read this article in full or to leave a comment, please click here

Leveraging IXP Colocation as an Enterprise

Providing a comprehensive solution for global connectivity is still not a trivial task. As most global enterprises know, the scale both geographically and organizationally can kill almost any well engineered network design.  Size and complexity aside, just designing for the next “XaaS” solution and cloud sprawl can greatly challenge most network engineers One approach to […]

The post Leveraging IXP Colocation as an Enterprise appeared first on Packet Pushers.

Leveraging IXP Colocation as an Enterprise

Providing a comprehensive solution for global connectivity is still not a trivial task. As most global enterprises know, the scale both geographically and organizationally can kill almost any well engineered network design.  Size and complexity aside, just designing for the next “XaaS” solution and cloud sprawl can greatly challenge most network engineers One approach to […]

The post Leveraging IXP Colocation as an Enterprise appeared first on Packet Pushers.

Making a docker container for a Flask application

Recently I presented to you a project called PLAZA which basically serves as a Web UI for python scripts. It was a pleasure to see that this project was welcomed well and some folks even asked how they can get PLAZA to play with. My fault, I wanted to release it so bad that I missed

Using OpenSwitch Appliance With GNS3

Note: This article was originally published here.

Update:This post has been updated to account for some recent changes in the appliance configuration (support for up to 7 front ports). In my previous post I described my developer setup to work with OpenSwitch. At the end of my post I showed how to download the build system, and configure and build an ‘appliance’ image.

What Is An OpenSwitch Appliance?

The appliance is a virtual machine image (in OVA format) that could be run on VirtualBox or VMware (on this articule I will focus on VirtualBox) and provides a software datapath (based in OVS right now, but P4 support it’s landing soon). All the rest of the OpenSwitch stack is the same that you will see in a real hardware, and obviously the software datapath has certain limitations and features not implemented.

Despite his limitations, the appliance is a really nice way to get your hands into OpenSwitch without having real hardware.

If you are using the development environment, you can find the appliance .ova file on the images directory after completing the build, but otherwise you can also download a periodic image from the project archives (keep in mind Continue reading

Here’s what the new Intel will look like

The PC market has been in trouble for ages, but last year took the biscuit. Shipments dropped below 300 million for the first time since 2008, and IDC declared it the worst year in history. That explains a lot about what happened at Intel this week.The chip maker has been reducing its dependency on PCs for some time, preferring to focus on its more successful data center business. But the announcement that it would lay off 12,000 people is a sign that Intel is finally turning a corner.To read this article in full or to leave a comment, please click here