QOTW: Obsession with Knowledge

Like Gollum’s self-destructive obsession with the ring in Tolkien’s novels, when we see knowledge as something to possess, not only do we miss out on the fulfillment of seeing that knowledge positively influence the lives of those around us, but we miss out on the rich personal growth that results from participation in a free give and take of truth.
Philip Dow, Virtuous Minds

LinkedInTwitterGoogle+FacebookPinterest

The post QOTW: Obsession with Knowledge appeared first on 'net work.

Securing OpenStack Hosts with Ansible

Openstack-Tokyo

Deploying OpenStack can be a challenging process, and securing it can be even more daunting. Fortunately, there's a new project in the OpenStack big tent that wants to make this process easier: openstack-ansible-security.

Start Standardizing With the STIG

Securing an OpenStack deployment involves multiple levels of configuration:

  1. Securing the network
  2. Securing the host
  3. Securing the interconnected services

The goal of openstack-ansible-security is to tackle the second level -- securing the host.  A spec was proposed for the Mitaka release of OpenStack to secure OpenStack infrastructure hosts using the Red Hat Enterprise Linux 6 Security Technical Implementation Guide (STIG).

The STIG is a collection of best practices for securing a host and its services against common attacks.  The collection is broken up into multiple sections, called categories.  The STIG Viewer service makes these categories easier to review.  The categories include:

  • Cat 1: For highly sensitive systems
  • Cat 2: For medium sensitivity systems
  • Cat 3: For low sensitivity systems

These are meant to be stackable, so an extremely sensitive system would require categories 1, 2 and 3.  Each STIG item provides a description of what needs to be changed, why it should be changed, how to change it, and Continue reading

Cisco fixes iOS 9 compatibility issue that blocked some VPNs

When iOS 9 debuted in September, Cisco's AnyConnect VPN client for iOS stopped working correctly with some VPN server configurations, preventing resources from loading. During iOS 9's beta period, Cisco filed a bug report with Apple about iOS 9 breaking DNS resolution in IPv4-based split tunnneling, but iOS 9 shipped without a fix. So did iOS 9.01, 9.02, and this week's iOS 9.1.But on Thursday, Cisco released an AnyConnect client update in the App Store, version 4.0.03016, that resolves the issue. Split-tunnel VPNs again work correctly, InfoWorld's tests reveal.To read this article in full or to leave a comment, please click here

How to Make a Science Reasonable Research Paper

They are simply not a reality of what faculty is really like although movies like Dog House are unquestionably engaging. Some college students might differ with me, but faculty is not about becoming successful socially, all, instead, it’s about being successful academically. Your freshman year is your vital year of school. For all, it fails them as university students or makes them. Students who wander onto university their year thinking that faculty is one occasion that is large come in to get a rude awakening, particularly if they’ve been hearing upperclassmen reveal reports about waiting before the last second to create that report and not going to course. Continue reading

How to Publish a Two Page Paper in a Single Day

A dog photo in a “poop argument” has enraged visitors of a SWAT group standoff when nearly several users of the Wisconsin police SWAT team turned up, positioned themselves behind an armored vehicle, and pumped two fits right into a little, end-wagging puppy. The SWAT were termed following the pet, who lowered a deuce within the wrong position, started a defecation conflict between his neighbors and an man. Writes the NY Daily Information on Nov. 3: ” SWAT crew delivered to manage a town argument over waste ended up igniting a firestorm of criticism from the nearby police force, and harming canine. Continue reading

Russian cyberspies targeted the MH17 crash investigation

A Russian cyberespionage group that frequently targets government institutions from NATO member countries tried to infiltrate the international investigation into the crash of Malaysia Airlines Flight 17 (MH17).MH17 was a passenger flight from Amsterdam to Kuala Lumpur that crashed in eastern Ukraine close to the Russian border on 17 July, 2014. All 283 passengers and 15 crew members lost their lives.The Dutch Safety Board led an international investigation into the incident and released a final report on Oct. 13, concluding that the Boeing 777-200 aircraft was shot down by a warhead launched from a Russian-built Buk missile system.To read this article in full or to leave a comment, please click here

25% Off Your ONUG Fall 2015 Registration

The Packet Pushers will be at the Open Networking User Group fall gathering at the New York University Kimmel Center in Manhattan, November 4 & 5, 2015. We'll be attending most of the open sessions, chatting with real people, and doing some live blogging. If you haven't registered for ONUG yet, you can get 25% off using code Packet25.

The post 25% Off Your ONUG Fall 2015 Registration appeared first on Packet Pushers.

CCNA – Operation Of IP Data Networks 1.5

We move on to the next topic which is

1.5 Predict the data flow between two hosts across a network

This is a very important topic for the CCNA. It may feel a bit overwhelming at first to grasp all the steps of the data flow but as a CCNA you need to learn how this process works. We will start out with an example where two hosts are on the same LAN and then we will look at an example which involves routing as well.

The first topology has two hosts H1 and H2 with IP adresses 10.0.0.10 and 10.0.0.20 respectively.

CCNA Basic LAN 1
CCNA Basic LAN 1

Host 1 and Host 2 are both connected to Switch 1 and has not communicated previously. H1 has the MAC adress 0000.0000.0001 and H2 has the MAC address 0000.0000.0002. H1 wants to send data to H2, which steps are involved?

1. H1 knows the destination IP of H2 (10.0.0.20) and runs AND to determine that they are on the same subnet.
2. H1 checkts its ARP cache which is empty for 10.0.0.20.
3. H1 generates ARP message Continue reading

Joomla releases patch for serious SQLi flaw

Joomla, a popular content management system, released patches on Thursday for a vulnerability that can allow an attacker to get full administrative access to a website.Joomla versions 3.2 through 3.4.4 are vulnerable, and the latest version is 3.4.5.The SQL injection flaw was found by Asaf Orphani, a researcher with Trustwave's SpiderLabs, and Netanel Rubin of PerimeterX.SQL injection flaws occur when a backend database executes a malicious query when it shouldn't. The type of vulnerability is one of the most prevalent ones within web applications.To read this article in full or to leave a comment, please click here

MacKeeper buyers ask for refunds in droves following lawsuit

Tens of thousands of people who bought MacKeeper have filed for refunds as part of a proposed class-action settlement against the application's former developer.The number of refund requests has far exceeded what is typical in these type of lawsuits, surprising even experienced class-action lawyers.But the unfortunate side effect of the robust response means those who've applied will probably get a smaller refund.The class-action suit was filed in May 2014 on behalf of Pennsylvania resident Holly Yencha, who contended that MacKeeper falsely flagged security and performance problems in order to coax consumers into paying US$39.95 for the full version.To read this article in full or to leave a comment, please click here

When it comes to spam, IBM’s SoftLayer is the host with the most

IBM may be the fastest-growing vendor in the worldwide security software market, but it's also the owner of the world's largest source of spam.That's according to a Wednesday report by security expert Brian Krebs, who called out the company's SoftLayer subsidiary for being "the Internet’s most spam-friendly" service provider.SoftLayer currently holds the top position on antispam nonprofit Spamhaus.org's list of the world’s worst spam support ISPs, which it defines as the ISPs with the worst abuse departments and "consequently the worst reputations for knowingly hosting spam operations."To read this article in full or to leave a comment, please click here

Chase’s tweet backing PIN credit cards was a mistake, bank says

JP Morgan Chase Bank tweeted in error that its chip credit cards would be getting PIN security, a bank spokesman confirmed Thursday.The tweet, posted mid-day on Wednesday by @ChaseSupport, said: "Your security is our priority! We're planning to add Chip and PIN to our credit cards in the near future.""That tweet was sent in error yesterday," said JP Morgan Chase Bank spokesman Paul Hartwick in an email to Computerworld. "At this time we do not have current plans to offer chip-and-PIN credit cards."MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords The bank, one of the nation's largest card issuers, has already distributed 64 million of the newer, more secure chip cards, he said. Of those, 51 million are credit cards and 13 million are debit cards. The vast majority are on Visa's network and some are on MasterCard's.To read this article in full or to leave a comment, please click here

Tech support scammers put Mac owners in crosshairs

Technical support scammers have begun targeting Mac owners, a security researcher said today, adding them to much larger pool of potential victims running Windows because Apple's operating system has been relatively untouched by malware."These scams aren't being done with cold calls, but by aggressive malvertising," said Jerome Segura, a senior security researcher with San Jose, Calif.-based Malwarebytes. In some cases, Segura said, legitimate online ad networks are being abused by criminals.Mac owners who browse to what Segura called "lower-quality websites" may encounter attack code or scripts that hijack the browser to display scary, but bogus, warnings that their machine is at risk, then offer a telephone number to call for technical assistance.To read this article in full or to leave a comment, please click here

Are wearables worth the cybersecurity risk in the enterprise?

The Internet of Things and wearable technology are becoming more integrated into our everyday lives. If you haven't already, now is the time to begin planning for their security implications in the enterprise. According to research firm IHS Technology, more than 200 million wearables will be in use by 2018. That's 200 million more chances of a security issue within your organization. If that number doesn't startle you, Gartner further predicts that 30% of these devices will be invisible to the eye. Devices like smart contact lenses and smart jewelry will be making their way into your workplace. Will you be ready to keep them secure even if you can't see them?To read this article in full or to leave a comment, please click here

HP just dropped out of the public cloud – now what?

While HP’s announcement that it will shutter its Helion Public Cloud early next year didn’t surprise those who watch the market closely, the move does raise questions about what’s next for HP and other cloud vendors.HP plans to focus on two major areas: Bringing efficiencies to customers’ on-premises environments, and arming its partners with HP hardware and software to build out hosted clouds.Analysts say HP is the latest example of a legacy IT vendor that has had to adjust its cloud ambitions in light of how dominant Infrastructure-as-a-Service players Amazon Web Services and Microsoft have become. The consolation prize is that there’s still plenty of opportunity left in the private, managed and hybrid cloud markets.To read this article in full or to leave a comment, please click here