Now serving the Middle East: 4 new data centers, partnerships

Our last embarkation into a new geography coincided with a significant milestone: our 30th data center (and first in Africa) in Johannesburg, South Africa. And as we march past number 40, we’re proud to announce yet another. Introducing CloudFlare’s latest points of presence (PoPs) in Doha, Qatar; Dubai, United Arab Emirates; Kuwait City, Kuwait; and Muscat, Oman. These data centers are the first wave in our MENA (Middle East/North Africa) expansion, and the 39th, 40th, 41st and 42nd data centers, respectively, to join our global network.

Up to this point all CloudFlare traffic delivered to the MENA region was served from our London, Frankfurt, Marseille, Paris and/or Singapore data centers, with round trip latency of up to 200-350ms. As in Africa, local bandwidth in MENA is notoriously expensive making it cost prohibitive to deliver content locally. That is (once again), until now! We're proud to announce the first of a series of agreements with regional carriers including Etisalat, Omantel, Ooredoo, and Zain to help build a better Internet in the region.

How to build a better Internet

A few of the necessary ingredients to build a better Internet include international connectivity (often in Continue reading

BlackBerry denies its OS was to blame in Jeep Cherokee hack

Responding to an accusatory blog post, BlackBerry has again denied that its embedded operating system caused the potentially dangerous vulnerability recently demonstrated in Chrysler Jeep Cherokees.Last month, security researchers demonstrated how to circumnavigate the in-vehicle entertainment system of the Jeep Cherokee to take over the car itself, including control of the dashboard, steering mechanism, transmission, locks, and brakes.Over 1.4 million vehicles have subsequently been recalled to fix the problem. The dealerships will install updated software, though owners can install the update themselves.To read this article in full or to leave a comment, please click here

Some Yahoo Mail users menaced by zombified deleted emails

For Yahoo Mail users, some messages just won’t stay dead.Some users of the company’s popular Mail service report that messages they’ve deleted are reappearing in their inboxes, an issue that some say is a recurring problem.Since the beginning of July, more than 100 complaints have been posted in a forum devoted to Yahoo’s email service. Some users say hundreds if not thousands of emails that they had previously deleted have reappeared. Others say the emails continue to reappear after being deleted again.“I have deleted thousands of emails just to find them still in my inbox,” one user wrote on Monday. “I have better things to do than sit at this computer and do something over and over and over again,” the person wrote.To read this article in full or to leave a comment, please click here

Opera Software considers sale after lowering financial expectations

Opera Software, the company behind the Web browser of the same name, may be seeking a buyer after the company announced lowered expectations for its quarterly and annual financial results.The Norwegian browser maker previously said that it expected revenue of $630 million - 650 million in 2015, but revised that figure Friday to between $600 million and $618 million. It also said that its quarterly revenue would be $146 million, which is at the very bottom of its guidance range for the quarter and $5 million below the expectations of analysts surveyed by Thomson Reuters.Opera’s reduced expectations are a result of lower-than-anticipated returns from company’s mobile advertising business, specifically the non-Instant Play video advertising products from AdColony. While Opera is probably best known for its Web browser, the company actually makes most of its money from its advertising business.To read this article in full or to leave a comment, please click here

Cyber-physical attacks: Hacking a chemical plant

When it comes to hacking chemical plants, for an attacker to go hackedity-hack-hack and then the plant goes boom fortunately only happens in the movies. But “if you plan to improve your financial posture” now and at least in the five years is a good time for security researchers to jump into cyber-physical systems security where you will be most concerned about attacks that cause physical damage.Granted, you and attackers may know a lot about the IT world, and even Industrial Control Systems (ICS) aka SCADA, but hacking a chemical plant means also needing to know some physics, chemistry and engineering. The Damn Vulnerable Chemical Process was developed to help you master new skills; it’s the “first open source framework for cyber-physical experimentation based on two realistic models of chemical plants.”To read this article in full or to leave a comment, please click here

Docker Demo Webinar: FAQ

Thanks again to everyone who joined last week’s Docker Demo webinar! There were more questions than time to answer them – and we wanted to share the Q&A publicly so everyone had access to this information on their Docker journey. Don’t … Continued

Looking back: Viruses that led to a path of destruction

VirusesImage by BixentroThe world of computer viruses has changed drastically over the last 25 or so years. In the early days, internet users were very naïve towards email attachments, contributing to the alarming speed that viruses could spread across the globe. These days, viruses very rarely land in our inboxes due to preconfigured firewalls and strict measures from the likes of Gmail and Outlook. SSLs.com compiled this list in looking at the destructive viruses that wreaked havoc on the Internet.To read this article in full or to leave a comment, please click here

How to uncover the Dark Web

One of the best ways to understand your enemy – what he’s up to, what his capabilities are and how he can damage you – is to spy on him.And according to some cybercrime experts, one of the easier and more effective ways to do that is to hang out where the bad guys do – on the Dark Web.In a recent post on Dark Reading, Jason Polancich, founder and chief architect of SurfWatch Labs, asserted that, “most businesses already have all the tools on hand for starting a low-cost, high-return Dark Web intelligence operations within their own existing IT and cybersecurity teams.”To read this article in full or to leave a comment, please click here

Engineering Sense

Why_Didn't_They_Ask_Evans_First_Edition_Cover_1934Why didn’t they ask Evans?

For those who haven’t read the famous Agatha Christie novel, the entire point revolves around a man uttering these words just before dying. Who is Evans? What does this person know that can lead to the murderer of the man on the golf course? Bobby and Frankie, the heroes of the story, are led on one wild goose chase after another, until they finally discover it’s not what Evans knows but who Evans knows that really matters.

Okay… But this isn’t a blog about mysteries, it’s about engineering. What does Evans have to do with engineering? Troubleshooting, as Fish says, is often like working through a mystery novel. But I think the analogy can be carried farther than this. Engineering, even on the design side, is much like a mystery novel. It’s often the context of the question, or the context of the answer to the question, that solves the mystery. It’s Poirot straightening the items sitting on a mantelpiece twice, it’s the dog that didn’t bark, and it’s the funny footprints and the Sign of Four.

Just like the detective in a mystery novel, the engineer can only solve the problem if they can Continue reading

Well Known Intervals

planet-oceanListed below are many events which occur on network devices at well-known intervals. The list is provided to serve as an aid while troubleshooting recurring network disruptions. Please consider helping to expand this list by adding other recurrent issues you encounter not already listed.

This list was generated by Jeremy Stretch from PacketLife, but lost after he took his wiki down. Luckily I had previously saved it, as I found it useful, and with his permission I’ve reposted it here.

Short (<=5 minutes)

1 Second

  • Default VRRP hello timer
  • Default EAP-Identity-Request Timeout (Unified WLAN)
  • Default EAP-Request Timeout (Unified WLAN)
  • Default EAPOL-KEY Timeout (Unified WLAN)
  • CleanAir AP Sampling Interval (Unified WLAN)
  • Default Group Specific Query interval (Maximum Response Time of 10) for IGMPv2

2 Seconds

New products of the week 08.10.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Newly Observed Domains and HostnamesKey features: Newly Observed Domains and Hostnames tracks new hostnames, or fully qualified domain names, when first seen on Internet. This real-time knowledge allows organizations to discover malicious hostnames targeting users. More info.To read this article in full or to leave a comment, please click here

A10 Health Monitors

This post is an equivalence check of A10 vs ACE probes/health monitors.

    ACE

ACE-A# show probe

probe : tcp-3121-probe-1
type : TCP
state : ACTIVE
----------------------------------------------
port : 3121 address : 0.0.0.0 addr type : -
interval : 10 pass intvl : 30 pass count : 2
fail count: 2 recv timeout: 5

--------------------- probe results --------------------
probe association probed-address probes failed passed health
------------------- ---------------+----------+----------+----------+-------
serverfarm : vip-11.95.79.90_3121
real : ip-11.95.79.68[3121]
11.95.79.68 1286028 1104 1284924 SUCCESS

interval – the time period health checks for a healthy server are sent
pass intvl – the time period health checks for a server marked “DOWN” are sent
pass count – the number of successful probes required to mark a server as “UP”
fail count – the number of unsuccessful probes required to mark a server as “DOWN”
recv timeout – timeout before a probe fails


a10-1[test-1]#show health monitor
Idle = Not used by any server In use = Used by server
Attrs = Attributes G = GSLB
Monitor Name Interval Retries Timeout Up-Retries Method Status Attrs
---------------------------------------------------------------------------------
tcp-443-monitor-1 30 2 5 2 TCP In use

Interval – the time period Continue reading