Countless computers vulnerable to MouseJack attack through wireless mice and keyboards

Countless wireless mice and keyboards can be hacked from 100 yards away leaving their host machines and the networks they are attached to open to malware, Bastille has discovered.The problem, which is being called MouseJack, affects Amazon, Dell, Gigabyte, HP, Lenovo, Logitech and Microsoft products, the company says, and likely more vendors’ gear that they haven’t tested. Logitech alone shipped its billionth mouse in 2008, so the problem is widespread.+More on Network World: Startup Trusona is launching what it claims to be a 100% accurate authentication scheme aimed at corporate executives+To read this article in full or to leave a comment, please click here

Bill Gates backs the U.S. government in Apple’s iPhone privacy standoff

Microsoft founder Bill Gates says he supports the U.S. government in its efforts to unearth the contents of a terrorist’s iPhone, countering a trend by other tech leaders to back Apple’s refusal to code a backdoor into its iOS operating system.Gates appears to have made the case, however, that he is in favor of the government’s request because he feels it is narrowly worded. “This is a specific case where the government is asking for access to information,” Gates told the Financial Times in a story published Monday night Pacific time. “They are not asking for some general thing; they are asking for a particular case.”To read this article in full or to leave a comment, please click here

Blessay: Successful Private Clouds Aren’t Spoken Of In Public

You don’t hear much about successful “Private Clouds” because they aren’t done in public. Two takeaways. People are talking a lot about public cloud because its good business not necessarily because its good technology [1] Private Clouds are being successfully deployed in vast numbers and no one is talking about them. This is also good […]

The post Blessay: Successful Private Clouds Aren’t Spoken Of In Public appeared first on EtherealMind.

Apple and the FBI will need to compromise, Cisco’s CEO says

Cisco Systems CEO Chuck Robbins gave up a chance to strongly support enterprise mobility partner Apple in its fight with the FBI over iPhone encryption.Asked about the controversy during a press briefing at Mobile World Congress, Robbins said he doesn't think vendors should put back doors in products. But when it comes to personal privacy versus national security, "There needs to be a balance," he said. Ultimately, the two sides will need to compromise, Robbins said.+ ALSO ON NETWORK WORLD Tim Cook refuses order to help unlock terrorist's iPhone 5c +To read this article in full or to leave a comment, please click here

Apple and the FBI will need to compromise, Cisco’s CEO says

Cisco Systems CEO Chuck Robbins gave up a chance to strongly support enterprise mobility partner Apple in its fight with the FBI over iPhone encryption.Asked about the controversy during a press briefing at Mobile World Congress, Robbins said he doesn't think vendors should put back doors in products. But when it comes to personal privacy versus national security, "There needs to be a balance," he said. Ultimately, the two sides will need to compromise, Robbins said.+ ALSO ON NETWORK WORLD Tim Cook refuses order to help unlock terrorist's iPhone 5c +To read this article in full or to leave a comment, please click here

Label Switched Multicast – An Introduction

There are two common methods for transporting multicast packets within an MPLS-based Layer 3 VPN:

  1. Generic Routing Encapsulation (GRE) with Protocol Independent Multicast (PIM) (also known as “draft-rosen”)
  2. Label Switched Multicast (LSM)

There’s also a third method which uses Resource Reservation Protocol—Traffic Engineering (RSVP-TE) but I’m not going to get into that one.

In this first post in a series on LSM, I’ll describe how draft-rosen works, how LSM works, and then compare and contrast the two. Subsequent posts will focus solely on LSM.

At the end of this post, you will be able to describe conceptually how the control and data planes work with LSM and what the pros and cons are of LSM as compared to draft-rosen.

I will not be covering any theory on multicast or MPLS and will instead recommend that you be familiar with both topics before reading further.

Here we go!

Draft-rosen

All in all, draft-rosen is not all that different from running PIM-Sparse Mode (SM) in a non-MPLS network.

Draft-rosen requires that the MPLS network — the P and PE routers — all be multicast enabled and all run PIM. Each PE that is participating in the draft-rosen multicast network will form a Continue reading

Cross Continental vMotion with VMware NSX and IBM Softlayer Cloud

Ten years ago, using VMware vMotion to migrate a Virtual Machine from one server to another, even in the same rack without interruption, was considered black magic, prompting raised eyebrows and a flurry of questions.  Today, it takes quite a bit more than just a standard host-to-host vMotion to solicit a similar response.Recently however, we received a reaction similar to the days of old, rich with the nostalgia of the early days of vMotion. Continue reading

Apple vs. FBI case colors European debate about securing digital identity

Although Apple does not exhibit at Mobile World Congress, the giant trade show in Barcelona, the company casts a long shadow over it.The iPhone maker's influence there extends to app developers, accessory vendors and, now, the debate about securing digital identity.In a keynote session on security at the show, moderator Michael O'Hara asked presenters whether they sided with Apple or the U.S. government in the legal dispute over whether Apple should help the Federal Bureau of Investigation unlock an iPhone belonging to the employer of one of the San Bernardino attack suspects.For Simon Segars, CEO of ARM, the company that designs the microprocessors found in most smartphones, "It's a complex situation, there are rights and wrongs."To read this article in full or to leave a comment, please click here

What They Said: vSphere 6 Networking Deep Dive

One of the engineers watching the vSphere 6 Networking Deep Dive found it particularly useful:

There were pearls of knowledge in there which expanded my understanding of ESX and gave me more than a few "aha!" moments […] The course is worth the money and time for sections "uplink redundancy & load balancing" and "VLAN based virtual networks" alone.

Not convinced? Check out other reviews and survey results.

CloudFlare launches secure domain name management service

CloudFlare has launched a domain name registration service with enhanced security controls designed to prevent domain hijacking, a serious attack that can have far-reaching consequences for companies.Its Registrar keeps a close eye on domain name registrations and changes to registrations with the intention of preventing attackers from gaining control of a domain name, said Ryan Lackey, who works with CloudFlare's security product strategy.The idea came after CloudFlare began looking for a domain name registrar with better security, Lackey said. CloudFlare is a constant target for attackers. They couldn't find anything suitable, so CloudFlare decided to develop its own.To read this article in full or to leave a comment, please click here

Setting up bonding on Ubuntu 14.04


This one was a twister to me. Linux bonding is fairly simple and there are numerous blogs out there explaining the steps to get two interfaces on a linux machine bonded. There's tons of information and step-by-step guides describing what needs to be done on an Ubuntu based system for bond configuration. I was surprised when I failed to get it working after multiple attempts. I finally ended up mixing steps from more than two different blog sources to get the setup configured correctly and more importantly persist it over reboots.

Before diving deep with specifics and yet another step-by-step guide to setting up bonds on an Ubuntu 12.02 or 14.04 machine, lets see what linux bonds are and why bonding in the first place. If you were a kid in the 90's or before you'd know what a NIC is. These days with PC's going almost extinct in the home and personal computing space, it is quite hard for users to be acquainted with network cards housing one or more NICs (Network Interface Controller). This era is all about wireless - you still do have a wireless card in your laptop or notebooks or tablets but that's Continue reading

Label Switched Multicast — An Introduction

There are two common methods for transporting multicast packets within an MPLS-based Layer 3 VPN:

  1. Generic Routing Encapsulation (GRE) with Protocol Independent Multicast (PIM) (also known as “draft-rosen”)
  2. Label Switched Multicast (LSM)

There's also a third method which uses Resource Reservation Protocol-Traffic Engineering (RSVP-TE) but I'm not going to get into that one.

In this first post in a series on LSM, I'll describe how draft-rosen works, how LSM works, and then compare and contrast the two. Subsequent posts will focus solely on LSM.

At the end of this post, you will be able to describe conceptually how the control and data planes work with LSM and what the pros and cons are of LSM as compared to draft-rosen.

I will not be covering any theory on multicast or MPLS and will instead recommend that you be familiar with both topics before reading further.

Here we go!

Most Americans support the FBI over Apple, Pew study finds

Most Americans think that Apple should help the FBI unlock a smartphone used by one of the terrorists in the San Bernardino mass shooting, according to a study released Monday by the Pew Research Center. Fifty-one percent of those asked said they think Apple should unlock the iPhone to help the FBI with its investigation, while 38 percent said it should not unlock the phone to protect the security of its other users. Eleven percent of respondents had no opinion either way. Pew Pew found that a majority of Americans think Apple should help the FBI unlock the iPhoneTo read this article in full or to leave a comment, please click here