Malware enables cheating at online poker

Online poker malware lets players cheat by getting a peek at cards held by opponents whose machines have been infected.The Trojan, called Win32/Spy.Odlanor, is typically downloaded by victims because it is disguised as installers or resources such as poker databases and poker calculators, according to the ESET WeLiveSecurity blog.“In other cases, it was loaded onto the victim’s system through various poker-related programs … such as Tournament Shark, Poker Calculator Pro, Smart Buddy, Poker Office, and others,” the blog says.Once installed it grabs screenshots of the PokerStars and Full Tilt Poker clients, letting the attackers see what cards the victim holds. In order to carry out the scam, the cheaters have to find and join the table at which the infected machine is playing.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What does a next-generation WAN look like?

After years of sitting in the shadow of virtualization, SaaS, containers, and all the other exciting IT trends, the wide area network is finally getting some attention. These other trends are actually drivers for this change in many cases; while WAN architectures have remained relatively static in recent years, the applications they need to support have changed beyond recognition. This is driving the need to re-think what the WAN looks like and how it operates.The phrase 'next-generation WAN' will mean different things to different enterprises, but let's identify some of the characteristics that are starting to become more common. Some of these are new, but in many cases the next-generation WAN is a new network methodology or mindset. This can impact the technologies used, insourcing/outsourcing decisions, and functionality provided by the network.To read this article in full or to leave a comment, please click here

Breach Presumption: The East-West Data Center Security Problem

A recurring trend in security briefings I've taken over the last year is that breaches are assumed. If you don't assume your infrastructure has been breached, you're ignorant, and probably willfully so. Ostrich, meet sand. A weird response my brain had to this is to ponder that if we've lost the war, why are we still fighting?

Fiber bandits: FBI hunting serial fiber-cutting vandals in California

AT&T recently announced a $250,000 reward to anyone with information on whoever entered its underground facilities in Livermore, California – a San Francisco suburb – and severed two of its fiber cables earlier this week, USA Today reported yesterday. The vandalism echoes 14 similar attacks that have destroyed damaged fiber cables and disrupted internet service for customers of several service providers in the northern California region dating back to July 2014. USA Today also reported a similar attack in late June, when "someone broke into an underground vault and cut three fiber-optic cables belonging to Colorado-based service providers Level 3 and Zayo," according to an earlier USA Today report. The FBI confirmed at the time that it was investigating connections between that attack and 11 similar outages in the region over the year prior. To read this article in full or to leave a comment, please click here

Fiber bandits: FBI hunting repeated fiber-cutting vandals in California

AT&T recently announced a $250,000 reward to anyone with information on whoever entered its underground facilities in Livermore, California – a San Francisco suburb – and severed two of its fiber cables earlier this week, USA Today reported yesterday. The vandalism echoes 14 similar attacks that have destroyed damaged fiber cables and disrupted internet service for customers of several service providers in the northern California region dating back to July 2014. USA Today also reported a similar attack in late June, when "someone broke into an underground vault and cut three fiber-optic cables belonging to Colorado-based service providers Level 3 and Zayo," according to an earlier USA Today report. The FBI confirmed at the time that it was investigating connections between that attack and 11 similar outages in the region over the year prior. To read this article in full or to leave a comment, please click here

The Texas Tribune: Our Docker Journey

written by Daniel Craigmile, System Architect at The Texas Tribune  We’re fans of Docker at The Texas Tribune. We’ve been playing with it since well before the 1.0 release and immediately started incorporating it into our infrastructure when the first production-ready code … Continued

Managing Junos Commit Time

I’ve been working with an ISP that is going to be using a large amount of configuration in the ‘groups’ section.  The statements there will be inherited into the main configuration using the ‘apply-groups’ statement.

This is a clever way of writing commands once and having them apply to multiple parts of the configuration.  At a basic level you could match on interfaces beginning with ‘ge-‘ or ‘xe-‘ and set an MTU on them all using one group statement. This MTU setting would not appear in the main configuration unless the configuration was displayed using “show | display inheritance”. There’s a nice explanation of how groups work over at this Packetpushers blog.

The downside is that if large amounts of configuration work is done in groups, applying the config can become slow during the ‘commit’ process.  

What happens under the hood when the user issues a commit in Junos?  You can see what happens if you issue a ‘commit | display detail’.  There is an example in this KB article.   As you can see there is a lot of parsing for commit-scripts, interface ranges and apply-groups at the start.  The config in these needs to be expanded and incorporated Continue reading

Managing Junos Commit Time

I’ve been working with an ISP that is going to be using a large amount of configuration in the ‘groups’ section.  The statements there will be inherited into the main configuration using the ‘apply-groups’ statement.

This is a clever way of writing commands once and having them apply to multiple parts of the configuration.  At a basic level you could match on interfaces beginning with ‘ge-‘ or ‘xe-‘ and set an MTU on them all using one group statement. This MTU setting would not appear in the main configuration unless the configuration was displayed using “show | display inheritance”. There’s a nice explanation of how groups work over at this Packetpushers blog.

The downside is that if large amounts of configuration work is done in groups, applying the config can become slow during the ‘commit’ process.  

What happens under the hood when the user issues a commit in Junos?  You can see what happens if you issue a ‘commit | display detail’.  There is an example in this KB article.   As you can see there is a lot of parsing for commit-scripts, interface ranges and apply-groups at the start.  The config in these needs to be expanded and incorporated Continue reading

F5 Virtual Appliance – How to install the VE LTM on ESXi

Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
In my opinion F5 are the market leader in load balancing appliances. If you are just starting out and want to get some experience on the platform how do you do it? With a new F5 4000s coming in around $30,000 its not a cheap box to put in your lab. The answer is the F5 virtual […]

Post taken from CCIE Blog

Original post F5 Virtual Appliance – How to install the VE LTM on ESXi