A Quick Look at Carina

Today at the OpenStack Summit in Tokyo, Rackspace announced Carina, a new containers-as-a-service offering that is currently in beta. I took a few minutes to sign up for Carina today and work with it for a little while, and here is a quick introduction.

First, if you’re at all unfamiliar with Docker and/or Docker Swarm, have a look at some of these articles off my site. They’ll help provide some baseline knowledge:

A Quick Introduction to Docker
Running a Small Docker Swarm Cluster

I point out these articles because Carina essentially implements hosted Docker Swarm clusters. You can use the Carina CLI tool (as I will in this article) to create one or more clusters, each of which will expose a Docker API endpoint (just like your own homegrown Docker Swarm cluster) against which you can run the Docker client.

Let’s take a quick look. These instructions assume that you’ve already created an account and downloaded the CLI tool from GitHub. I’m assuming you’re running Linux or OS X; the commands for Windows would be quite different than what I’ll show below.

First, you’ll need to set some environmental variables. I prefer to do this in a file that Continue reading

VRRP on Linux Using Keepalived – The Basics

I’ve recently been working on an implementation of VRRP on Linux using Keepalived to provide IP redundancy for some HA Proxy load balancers. I’ve been pleasantly surprised by how simple and fast it is and thought I’d share the details now I understand why it’s the default choice for many. Keepalived has been around for 15 […]

The post VRRP on Linux Using Keepalived – The Basics appeared first on Packet Pushers.

Strengthen your network security with Passive DNS

Over the past few years, we’ve witnessed increasing attacks against DNS infrastructure: DDoS attacks against authoritative name servers, name servers used as amplifiers in DDoS attacks, compromised registrar accounts used to modify delegation information, cache poisoning attacks, and abuse of name servers by malware. Thankfully, we’ve also seen the concurrent development of powerful new mechanisms for combating those threats, including the DNS Security Extensions, response policy zones, and response rate limiting.Perhaps the most promising means of enhancing DNS security, and the security of the Internet generally, has yet to be fully exploited. That’s Passive DNS data.To read this article in full or to leave a comment, please click here

Microsoft’s advice: Hang up on tech support scammers

Microsoft's best advice to combat tech support scams? Hang up the phone."You get a call from someone that's unsolicited, talking about technical support, hang up," said David Finn, the executive director of Microsoft's Digital Crime Unit, during a hearing held by the U.S. Senate last week. "That's the first thing. That is not a legitimate effort to sell something to you."Finn was one of several people who testified last Wednesday before the Senate's Special Committee on Aging, which held a hearing on technical support scams, which disproportionately target the elderly.Such scams, Finn said during his prepared testimony, are the "single largest consumer fraud perpetrated in America today." They victimize an estimated 3.3 million people and rake in $1.5 billion annually. "This translates to a victim nearly every 10 seconds, with an average loss of $454 per consumer," Finn said.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How hackers compromised chipped credit cards, and how the authorities discovered it

Chipped cards have been hacked in the past, despite the security rhetoric from banks and merchants.Until recently, it was done through a Man-in-the-Middle attack.'Man-in-the-Middle' is where an attacker changes the communication between parties who think they're talking with each other directly.Security measures are now in place to stop this kind of chip scam, but it was not until scientists studied the forensics that the police could even figure it out.Second chip It turns out that the fraud worked through a second chip embedded in the card, installed there by the crook.The glued-on dummy chip answered affirmatively when polled. It let a transaction go through when the terminal asked the card's original chip if the entered PIN was correct, Catalin Cimpanu explained in a Softpedia article.To read this article in full or to leave a comment, please click here

South Korean manufacturing industry targeted with new backdoor program

South Korean organizations are being targeted in attacks with a new stealthy backdoor program that gives attackers full access to infected computers.The malware has been dubbed Duuzer and while it's not exclusively used against targets in South Korea, it does seem that the hacker group behind it have a preference for that country's manufacturing industry, according to security firm Symantec.Duuzer was designed to work on both 32-bit and 64-bit Windows versions and opens a back door through which attackers can gather system information; create, list and kill processes; access, modify and delete files; execute commands and more."It’s clearly the work of skilled attackers looking to obtain valuable information," researchers from Symantec's security response team said in a blog post.To read this article in full or to leave a comment, please click here

Cybersecurity careers: Where are the women?

There is a serious and growing gap between men and women when it comes to choosing a cybersecurity career – then again there’s also a serious disinterest in the field altogether from millennials.+More on Network World: What’s hot in driverless cars?+Those were the chief findings of a global study issued by Raytheon (NYSE: RTN) and the National Cyber Security Alliance (NCSA) this week that noted: In the U.S., 74% of young women and 57% of young men said schools did not offer the skills that are needed to pursue a degree in computer sciences.To read this article in full or to leave a comment, please click here

Sponsored Post: Digit, iStreamPlanet, Instrumental, Redis Labs, Jut.io, SignalFx, InMemory.Net, VividCortex, MemSQL, Scalyr, AiScaler, AppDynamics, ManageEngine, Site24x7

Who's Hiring?

  • Digit Game Studios, Irish’s largest game development studio, is looking for game server engineers to work on existing and new mobile 3D MMO games. Our most recent project in development is based on an iconic AAA-IP and therefore we expect very high DAU & CCU numbers. If you are passionate about games and if you are experienced in creating low-latency architectures and/or highly scalable but consistent solutions then talk to us and apply here.

  • As a Networking & Systems Software Engineer at iStreamPlanet you’ll be driving the design and implementation of a high-throughput video distribution system. Our cloud-based approach to video streaming requires terabytes of high-definition video routed throughout the world. You will work in a highly-collaborative, agile environment that thrives on success and eats big challenges for lunch. Please apply here.

  • As a Scalable Storage Software Engineer at iStreamPlanet you’ll be driving the design and implementation of numerous storage systems including software services, analytics and video archival. Our cloud-based approach to world-wide video streaming requires performant, scalable, and reliable storage and processing of data. You will work on small, collaborative teams to solve big problems, where you can see the impact of your work on the business. Continue reading

Join the Packet Pushers – Live SD-WAN Podcast with Viptela Nov. 4 in NYC

Next week, the Packet Pushers will be recording a podcast live in front of a crowd in NYC. We'll be talking SD-WAN deployment with Viptela customers who have been actively rolling out the solution. With this show, we want to move from "what is SD-WAN?" to "how is SD-WAN working for you?" Sign up to attend this event here:
http://viptela.com/sd-wan-evening-with-packet-pushers-part-2/

The post Join the Packet Pushers – Live SD-WAN Podcast with Viptela Nov. 4 in NYC appeared first on Packet Pushers.

Who Wants To Save Forever?

Save-icon

At the recent SpectraLogic summit in Boulder, much of the discussion centered around the idea of storing data and media in perpetuity. Technology has arrived at the point where it is actually cheaper to keep something tucked away rather than trying to figure out whether or not it should be kept. This is leading to a huge influx of media resources being available everywhere. The question now shifts away from storage and to retrieval. Can you really save something forever?

Another One Bites The Dust

Look around your desk. See if you can put your hands on each of the following:

* A USB Flash drive
* A DVD-RW
* A CD-ROM
* A Floppy Disk (bonus points for 5.25")

Odds are good that you can find at least three of those four items. Each of those items represents a common way of saving files in a removal format. I’m not even trying to cover all of the formats that have been used (I’m looking at you, ZIP drives). Each of these formats has been tucked away in a backpack or given to a colleague at some point to pass files back and forth.

Yet, each of these formats Continue reading

OpenStack Summit – Tokyo – 2015 – Tuesday 27th – Show Notes

It’s Tuesday morning, it’s 9am and the keynote started off in a blaze of glory.

Over 5000 attendees are present, from 56 countries. The opening presenter with a huge amount of energy stated:

OpenStack is the greatest open source project!

Can we argue with that? The obvious one being Linux, but a second place isn’t to be argued with.

Egle Sigler, Principal Architect, RackSpace, OpenStack Foundation Board Member: Use devstack, which provides visibility against usability for defcore. The more it’s used, the better the visibility. All goes to the common good.

DefCore sets base requirements by defining 1) capabilities, 2) code and 3) must-pass tests for all OpenStack products. This definition uses community resources and involvement to drive interoperability by creating the minimum standards for products labeled "OpenStack."

Lachlan Evenson: Lithium Technologies: Highly energetic Aussie, spoke about rapid development and deployment. Via the presentation, Lachlan showcased a realtime app built on Google tech; containers in OpenStack using Kubernetes and a five "minute deployment". Also demonstrated a home grown dashboard with honeycomb visualisation for each type of OpenStack project. Also via Slack, he showed the use of Kubot (A Kubernetes Slack ‘bot’) to talk to Kubernetes and scale up Continue reading

Judge suggests DOJ wants Apple to work for government by unlocking encrypted iPhone

When Apple and the DOJ were back in court Monday, arguing over Apple’s refusal to unlock an iPhone seized by law enforcement during an investigation, Magistrate Judge James Orenstein told government attorneys, “What you're asking them [Apple] to do is do work for you.”But Justice Department attorney Saritha Komatireddy argued that it has compelled Apple to unlock at least 70 devices since 2008. The government believes it has the power to force Apple to comply under the All Writs Act. Just Security explained, “Under the government’s interpretation of the All Writs Act, anyone who makes software could be dragooned into assisting the government in investigating users of the software. If the court adopts this view, it would give investigators immense power.”To read this article in full or to leave a comment, please click here

Cisco buying Lancope for $450M

Cisco this week said it would acquire security vendor Lancope for $452.5 million to bolster its threat visibility portfolio for enterprise networks.Lancope specializes in network behavior analytics, threat visibility and security intelligence. Its StealthWatch product is designed to continuously monitor the enterprise network and identify suspicious traffic patterns to detect attacks.+MORE ON NETWORK WORLD: Cisco plans to embed security everywhere+To read this article in full or to leave a comment, please click here