New to networking? Or maybe just new to Packet Pushers? Want to know which shows will help you build a foundation? Here you go. These shows cover major networking concepts, take on emerging technologies, and provide context for what we might talk about in other shows.
Dell CEO and Chairman Michael Dell is a few pen strokes away from buying a house in the city of Boston, Fortune reports, which may help assuage concerns here in Massachusetts that his company’s recent $67 billion purchase of EMC will result in the storage powerhouse and its some 9,500 local employees moving to Texas.Dell from the moment the deal was announced has said he plans to keep EMC right where it is, but nothing says “We’re sticking around” quite like ponying up for a local abode (Dell has other homes in Texas and Hawaii). And, local jobs aside, I have an even more parochial concern about Dell’s intentions: I live and pay taxes in the town of Hopkinton, which is the longtime home of EMC. There must be a second-largest employer/taxpayer, but I couldn’t tell you who that might be.To read this article in full or to leave a comment, please click here
Oracle has fixed a vulnerability in Java that a Russian cyberespionage group used to launch stealthy attacks earlier this year.At the same time, Oracle fixed 153 other security flaws in Java and a wide range of its other products, it said Tuesday.The Java vulnerability can be used to bypass the user confirmation requirement before a Web-based Java application is executed by the Java browser plug-in. This type of protection mechanism is commonly referred to as click-to-play.The flaw was reported to Oracle by security researchers from Trend Micro, who first spotted the vulnerability in July in attacks launched by a Russian hacker group dubbed Pawn Storm that commonly targets military and governmental institutions from NATO member countries.To read this article in full or to leave a comment, please click here
If I were a bit more snarky, I’d be tempted to say something like, “well, if you add a small hello protocol to each of the applets to monitor neighbor reachability, and a small protocol that can exchange local reachability information, and then perhaps a local algorithm to determine which path is the shortest, you can reinvent IS-IS.” But I’m not that snarky, of course…
I have come to believe that at least half of what we invent in the networking world is simply a product of not spending the time nor effort to study what’s already been invented, or the perception that what’s already been invented is “too complex,” and hence not stuff anyone wants to spend time learning nor understanding. A full three quarters of what remains is Continue reading
Today we’re pleased to announce the acquisition of Tutum, a cloud service used by developers and sysadmins to deploy and manage Docker applications. It’s been an exciting journey with the Tutum team and so we wanted to take a moment … Continued
Malvertising is the latest way for criminals to infect your computer with malware – and the only thing you need to do to allow it is to visit your favorite website that relies on advertising. That's because they're slipping bad code into ads that are put onto those websites through advertising networks. Big name websites like Forbes, Huffington Post and the Daily Mail have been the focus of attacks.In a recent report by Cyphort found that malvertising has spiked 325 percent in 2014. A more recent report shows that malvertising reached record levels this past summer. To read this article in full or to leave a comment, please click here
Join the Datanauts as they explore Apache Mesos, an open-source data center OS that abstracts compute, storage, and network to make it easier for applications to share resources.
During my recent SDN workshops I encountered several networking engineers who use Nexus 1000V in their data center environment, and some of them claimed their organization decided to do so to ensure the separation of responsibilities between networking and virtualization teams.
There are many good reasons one would use Nexus 1000V, but the one above is definitely not one of them.
1.4 Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
There are tons of books written on the OSI and TCP/IP model so I won’t describe these models in depth here. What I will do is explain what you need to know at each level and explain how the real world works. We have two models, one from OSI and one from DOD.
CCNA OSI vs DOD model
In the real life everyone references the OSI model. I’ve never heard anyone reference the DOD model which doesn’t mean it doesn’t have its merits but everyone always uses the OSI model as a reference.
The OSI model has seven layers but people sometimes joke that layer 8 is financial and layer 9 is political.
Starting out with the physical layer, what you need to know is auto negotiation. Auto negotiation is good, hard coding speed and duplex will no doubt lead to ports that are hard coded on one side and auto on the other side to end up in half duplex. Gone are the days when auto negotiation wasn’t compatible and lead to misconfigured Continue reading
In the last blog, I briefly mentioned about PCE and how BGP-LS can be used as one of the ways to collect the topology information. In this blog we will explore more about PCE, the problems it tries to solve and different elements of PCE. But before we go any deeper, I do want to […]
Google and Yahoo are expanding their use of a successful system for identifying spam.The move is part of years-long effort to implement a series of checks designed to figure out if an email really has been sent by the domain it purports to come from.Email spoofing has long been a problem since its easy to forge the "from" address, making it more likely the receiver will believe it came from a legitimate source.By Nov. 2, Yahoo plans to being using DMARC (Domain-based Message Authentication, Reporting & Conformance) for its ymail.com and rocketmail.com services. Next year, Google also plans to move Gmail to a strict DMARC policy, according to a news release.To read this article in full or to leave a comment, please click here
6WIND, a Packet Pushers sponsor, has been helping get the most networking performance from x86 hardware, making the acceleration software that other companies could use to make the most of their standard servers with multi-core CPUs and Linux. 6WIND has recently taken a further step, offering its own VNFs and virtual networking acceleration software packages to end users like you and me. For example, the Turbo Router and Turbo IPSEC appliances compete with virtual routers from Cisco and Brocade. 6WIND will be appearing on the Packet Pushers Priority Queue podcast near the end of October 2015.
Magento said Tuesday there does not appear to be a new vulnerability in its e-commerce platform that is causing some websites to become infected with the Neutrino exploit kit.
Some of the affected websites appear to not have patched a code execution vulnerability nicknamed the Shoplift Bug Patch, Magento's security team wrote in a blog post. A patch was released in February.
Other Magento-powered sites have not applied other patches, making them vulnerable.
The latest attack against Magento was highlighted by Malwarebytes and Sucuri, two security companies, who noticed attacks on the client and server sides.To read this article in full or to leave a comment, please click here
At the end of DockerCon 2015, Dieter Reuter from Hypriot presented a demo running 500 Docker containers on a Raspberry Pi 2 device but he knew that number could be at least doubled. TL;DR Dieter was right. A big congratulations … Continued