Hackers having a field day – time to rethink your blogging and publishing strategy

A while ago in another post I asked Is it time to give up on WordPress sites? and I got some interesting comments; here’s two that nail the issue and the growing sentiment: Marco Naseef: “extremely modular = extremely vulnerable”David Franks: “… I run a hundred or so Wordpress sites and I'm on the verge of throwing in the towel. / All the big hosts like Bluehost and Hostgator have their shared host platforms controlled by hackers and riddled with malware like dark leach. It's very dispiriting. / I think the days of Wordpress are numbered”To read this article in full or to leave a comment, please click here

Hacker who hacked Hacking Team published DIY how-to guide

The hacker responsible for bringing pwnage pain to the Hacking Team last July has published an in-depth “DIY guide” for how he pulled it off. It’s a detailed, really great read.The hacker is none other than Phineas Fisher; he runs the @GammaGroupPR Twitter account, now referred to as “Hack Back,” and previously leaked FinFisher spyware documents, including details like which antivirus solutions could detect Gamma International’s surveillance malware.To read this article in full or to leave a comment, please click here

Hacker who hacked Hacking Team published DIY how-to guide

The hacker responsible for bringing pwnage pain to the Hacking Team last July has published an in-depth “DIY guide” for how he pulled it off. It’s a detailed, really great read.The hacker is none other than Phineas Fisher; he runs the @GammaGroupPR Twitter account, now referred to as “Hack Back,” and previously leaked FinFisher spyware documents, including details like which antivirus solutions could detect Gamma International’s surveillance malware.To read this article in full or to leave a comment, please click here

Failover Mechanism Part- 3

How should Fail over need to be implemented if CPE router is common for
primary and secondary link ? Answer for the same can be found in this post.
This scenario may be refer as DPDLSC (DUAL POP DUAL LAST MILE SINGLE CPE)
Just to mention that traffic control is being done from CPE,ISP is very
much transparent and is not influencing traffic in this scenario.

 

failover mechanism3

 

Considering the above Topology.

FAILOVER MECHANISM —-
1. Outgoing Traffic from CPE is controlled using Local Preference (Higher local Preference, better path)
2. Incoming Traffic to CE is controlled using As Path Prepend ( lower as path count , better path)

 

NORMAL SCENERIO
Primary link is up ,Local preference is high for primary link than secondry and also there is no as-prepend as in secondry

OUTGOING TRAFFIC >>> LAN>CPE>PE1
INCOMING TRAFFIC >>> PE1>CPE>LAN

PRIMARY WAN LINK DOWN(PE1-CPE link down)
OUTGOING TRAFFIC  >>> LAN>CPE>PE2
INCOMING TRAFFIC >>> PE2>CPE>LAN

RELATED CPE CONFIGURATION

router bgp 64520
bgp log-neighbor-changes
network 10.0.0.0 mask 255.255.0.0
neighbor 172.10.1.1 remote-as 9730
neighbor 172.10.1.1 description PRIMARTY
neighbor 172.10.2.1 remote-as 9730
neighbor 172.10.2.1 description SECONDRY
Continue reading

Response: Stack Overflow: The Hardware

StackOverflow doesn’t run on the public cloud, its runs on dedicated hardware beacuse performance matters. Baremetal is fast. because their human infrastructure knows what they are doing the installation uses physical routers and firewalls. 2 Ethernet switches – Nexus 5596UP ( I don’t count Nexus 2000 as they are not switches, they are hubs running 802.1BR) I’ve […]

The post Response: Stack Overflow: The Hardware appeared first on EtherealMind.

Opensource Meetup Presentation

I did a presentation on CoreOS and Service Discovery in Opensource Meetup group last week. Following are related slides and demo recording. CoreOS Overview and Current Status Slides: CoreOS Overview and Current Status from Sreenivas Makam CoreOS HA Demo recording: Scripts used are available here. Service Discovery using etcd, Consul and Kubernetes Slides: Service Discovery using … Continue reading Opensource Meetup Presentation

What does BGP free core mean ?

What is the meaning of BGP free core? BGP refers to an Internet protocol used between different Autonomous System on the Internet. The purpose of this post is not to explain the fundamentals of BGP, as I believe that readers are already familiar with the basic of BGP and IP routing operation. To understand the […]

The post What does BGP free core mean ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

What is RSVP-TE ?

What is RSVP-TE (RSVP Traffic Engineering)?  RSVP-TE refers to a resource reservation protocol that is invented in order to allocate a bandwidth for the individual flows on the network devices. To say it another way, RSVP-TE are extensions to the RSVP protocol specified in the RFC 3209. Although, RSVP-TE has been initially invented as a Quality […]

The post What is RSVP-TE ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

The CEOs of Google and Oracle met for 6 hours Friday but failed to settle their lawsuit

The CEOs of Oracle and Google met for six hours on Friday but failed to reach a deal to end their massive copyright lawsuit over Google's use of Java in Android."After an earlier run at settling this case failed, the court observed that some cases just need to be tried. This case apparently needs to be tried twice," Magistrate Judge Paul Singh Grewal, who mediated the talks, noted on the court's docket.Oracle accuses Google of illegally copying a key part of the Java platform into its Android operating system, making billions in profit for Google and, according to Oracle, crushing Java’s chance of success in smartphones, tablets and other products.To read this article in full or to leave a comment, please click here

Chrome extensions will soon have to tell you what data they collect

Google is about to make it harder for Chrome extensions to collect your browsing data without letting you know about it, according to a new policy announced Friday.Starting in mid-July, developers releasing Chrome extensions will have to comply with a new User Data Policy that governs how they collect, transmit and store private information. Extensions will have to encrypt personal and sensitive information, and developers will have to disclose their privacy policies to users.Developers will also have to post a "prominent disclosure" when collecting sensitive data that isn't related to a prominent feature. That's important, because extensions have tremendous power to track users' browsing habits and then use that for nefarious purposes.To read this article in full or to leave a comment, please click here

Chrome extensions will soon have to tell you what data they collect

Google is about to make it harder for Chrome extensions to collect your browsing data without letting you know about it, according to a new policy announced Friday.Starting in mid-July, developers releasing Chrome extensions will have to comply with a new User Data Policy that governs how they collect, transmit and store private information. Extensions will have to encrypt personal and sensitive information, and developers will have to disclose their privacy policies to users.Developers will also have to post a "prominent disclosure" when collecting sensitive data that isn't related to a prominent feature. That's important, because extensions have tremendous power to track users' browsing habits and then use that for nefarious purposes.To read this article in full or to leave a comment, please click here

Schools put on high alert for JBoss ransomware exploit

More than 2,000 machines at schools and other organizations have been infected with a backdoor in unpatched versions of JBoss that could be used at any moment to install ransomware such as Samsam. That's according to Cisco's Talos threat-intelligence organization, which on Friday announced that roughly 3.2 million machines worldwide are at risk. Many of those already infected run Follett's Destiny library-management software, which is used by K-12 schools worldwide.To read this article in full or to leave a comment, please click here

Schools put on high alert for JBoss ransomware exploit

More than 2,000 machines at schools and other organizations have been infected with a backdoor in unpatched versions of JBoss that could be used at any moment to install ransomware such as Samsam. That's according to Cisco's Talos threat-intelligence organization, which on Friday announced that roughly 3.2 million machines worldwide are at risk. Many of those already infected run Follett's Destiny library-management software, which is used by K-12 schools worldwide.To read this article in full or to leave a comment, please click here

That man who ‘deleted his entire company’ with a line of code? It was a hoax

The owner of a Web hosting company who claimed to have erased his entire business from the Internet with a single script command appears to have made the whole thing up.Marco Marsala of Italy posted a cry for help on the popular Server Fault forum earlier this week, claiming he’d accidentally erased all the data on his servers including backups.“I run a small hosting provider with more or less 1,535 customers and I use Ansible to automate some operations to be run on all servers,” Marsala wrote. “Last night I accidentally ran, on all servers, a Bash script with a rm -rf {foo}/{bar} with those variables undefined due to a bug in the code above this line.To read this article in full or to leave a comment, please click here