VMware brings Michigan to Europe to boost virtual networking

VMware is taking Michigan to Europe as it works to make networking as secure in the hybrid cloud as it can be in a private datacenter. At its VMworld Europe conference, it unveiled new features and tools to make it easier to roll applications out to its unified hybrid cloud platform, expanding the range of management functions available on its public cloud, vCloud Air, which can be linked with private clouds using vSphere. The company also previewed a new technology, Project Michigan, that can deploy a secure enterprise gateway across vCloud Air offerings, including Disaster Recovery and Dedicated Cloud services. It will support VM migration and network and policy extension with low downtime through Hybrid Cloud Manager. It can be used to spin up thousands of virtual machines with secure connectivity on demand, it said.To read this article in full or to leave a comment, please click here

Google Graveyard: What Google has killed off in 2015

Six feet deepGoogle is truly a company that has more technology and products than it can handle sometimes, and in 2015 the company with the recent name change shed a host of tools and products to enable it to focus on more pressing needs. Here’s a look back at what Google this year has offed or announced plans to off (To go back even further, check out 2014’s Google Graveyard.)To read this article in full or to leave a comment, please click here

To scare people better, Android ransomware gets a snazzy UI

Hackers are like any other coders: they want to built better software, even if it's a program that merely aims to extract a ransom from a hapless Android user.Symantec said it has seen a new version of the Porn Droid ransomware that uses Google's custom-built design language, Material Design, to create more intimidating warnings.Discovered last year, Porn Droid purports to be an adult content viewer. If installed, it locks a device and warns that users have viewed illicit pornography and demands a ransom. The app has been seen on third-party Android application marketplaces or forums for pirated software.To read this article in full or to leave a comment, please click here

FlexVPN QoS

This post will cover several most common QoS configuration techniques for Multipoint VPNs. Focus will be on FlexVPN DMVPN, however most of the conclusions will be applicable to the traditional DMVPN as well. Assumptions Most of the FlexVPN and DMVPN deployments use Internet as a WAN transport. This creates a very unique set of requirements […]

The post FlexVPN QoS appeared first on Packet Pushers.

What the Dell, EMC merger really means

Despite its whopping price tag, the $67 billion Dell acquisition of EMC doesn't radically reshape the technology market. The acquisition, announced today, is not as disruptive to the tech market as, say, Oracle's purchase of Sun Microsystems, or Hewlett-Packard's acquisition of Digital Equipment Corp., companies with competitive platforms and technologies.To read this article in full or to leave a comment, please click here

Fake LinkedIn profiles lure unsuspecting users

No doubt you've received a LinkedIn invition from someone you don't know -- or you're not sure you know. Next time, you might want to think a little harder before accepting. Researchers from Dell SecureWorks Counter Threat Unit have identified a network of at least 25 well-developed LinkedIn profiles as part of a targeted social engineering campaign against individuals in the Middle East, North Africa, and South Asia. The fake profiles were linked to 204 legitimate profiles belonging to individuals working in defense, telecommunications, government, and utility sectors. A quarter of the victims worked in the telecommunications sector in the Middle East and North Africa. Fortunately, the fake profiles have already been removed from LinkedIn.To read this article in full or to leave a comment, please click here

CCNA – Operation of IP Data Networks 1.1

We kick off the CCNA series from the beginning. Operation of IP data networks is weighted as 5% in the CCNA RS blueprint. The first topic is:

1.1 Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs

Router

A router is a device that routes between different networks, meaning that it looks at the IP header and more specifically the destination IP of a packet to do forwarding. It uses a routing table which is populated by static routes and routes from dynamic protocols such as RIP, EIGRP, OSPF, ISIS and BGP. These routes are inserted into the Routing Information Base (RIB). The routes from different sources compete against each other and the best route gets inserted into the RIB. To define how trustworthy a route is, there is a metric called Administrative Distance (AD). These are some of the common AD values:

0          Connected route
1          Static route
20         External BGP
90         EIGRP
110        OSPF
115        ISIS
120        RIP
200        Internal BGP
255        Don't install

If a value of 255 is used, the route will not installed in the RIB as the route is deemed not trustworthy at all.

The goal Continue reading

Judge does not order Apple to disable security on encrypted device

Well, well, well…a federal magistrate of the U.S. District Court for the Eastern District of New York has so far refused to order Apple to disable security on a customer’s encrypted mobile device even though the government assured the judge that doing so “is not likely to place any unreasonable burden on Apple.”According to the court document (pdf), available on Cryptome which recently admitted to a leaking users’ IP addresses in a separate tech drama, the government filed a sealed application on Oct. 8; it asked the court “to issue an order pursuant to the All Writs Act,” and thereby force Apple “to assist in the execution of a federal search warrant by disabling the security of an Apple device that the government has lawfully seized pursuant to a warrant issued by this court. Law enforcement agents have discovered the device to be locked, and have tried and failed to bypass the lock.”To read this article in full or to leave a comment, please click here