Mozilla tests a true stealth mode for Firefox

Mozilla wants to make private browsing truly private.The company is testing enhancements to private browsing in Firefox designed to block website elements that could be used by third parties to track browsing behavior across sites. Most major browsers, Firefox included, have a “Do Not Track” option, though many companies do not honor it.Mozilla’s experimental tool is designed to block outside parties like ad networks or analytics companies from tracking users through cookies and browser fingerprinting.To read this article in full or to leave a comment, please click here

Dear Internet, Send Us Your Videos

alt

CloudFlare turns 5 years old this September. It's been an amazing ride since our launch. Before we launched at TechCrunch Disrupt on September 27, 2010, we'd signed up about 1,000 beta customers. It took us nine months to get those first customers. (By comparison, today we typically sign up 1,000 customers every 3 hours.)

Those first beta customers were instrumental. They put up with us when we were had only one data center (in Chicago). They put up with us as we brought traffic online in our next facilities in Ashburn, Virginia and San Jose, California — and had the routing challenges that came along with running a distributed network for the first time. They sent us bug reports, provided us feature requests, and were instrumental to building the foundation that grew into what is CloudFlare today.

Archival Footage

When we launched, we wanted to feature their stories and experience about CloudFlare so we had them submit their stories by video. Here's the video we included as part of our launch presentation.



I'm proud of the fact that more than 80% of those original 1,000 customers are still using CloudFlare five years later.

Send Us Your Stories

As we Continue reading

At what point do white hat hackers cross the ethical line?

In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts' side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing a live "pen-test" of a plane network in mid-air.

Whether this is true or not, it raises some valid concerns over the ethical implications of white hat hacking. In the case of Roberts, who, according to the affidavit, was able to steer the airplane off the intended course, the consequences could have been dire. It is not believed that Roberts had any intention of hurting either himself or any of the passengers, but if the affidavit is in fact true, the possibility was real.

To read this article in full or to leave a comment, please click here

FAA: Pilots report record number of unmanned aircraft encounters

The Federal Aviation Administration this week said that a record number of drone sightings reported by airline pilots and others has increased dramatically this year -- from a total of 238 sightings in all of 2014, to more than 650 by August 9.The FAA said pilots of a variety of different types of aircraft – including many large, commercial air carriers – reported spotting 16 unmanned aircraft in June of 2014, and 36 the following month. This year, 138 pilots reported seeing drones at altitudes of up to 10,000 feet during the month of June, and another 137 in July.+More on Network World: Hot stuff: The coolest drones+To read this article in full or to leave a comment, please click here

FAA: Pilots report record number of unmanned aircraft encounters

The Federal Aviation Administration this week said that a record number of drone sightings reported by airline pilots and others has increased dramatically this year -- from a total of 238 sightings in all of 2014, to more than 650 by August 9.The FAA said pilots of a variety of different types of aircraft – including many large, commercial air carriers – reported spotting 16 unmanned aircraft in June of 2014, and 36 the following month. This year, 138 pilots reported seeing drones at altitudes of up to 10,000 feet during the month of June, and another 137 in July.+More on Network World: Hot stuff: The coolest drones+To read this article in full or to leave a comment, please click here

Show 250 – How To Document A Network

A favorite topic among network engineers, documentation is a source of both wonder and horror. Network documentation is difficult to get right. How much detail is enough? How old is that diagram, really? Can't this be automated? Wait, the automated generator spit out *that*? In this show, the Packet Pushers along with former guest Dominik discuss their documentation experiences, good and bad. What have we gotten right? What have we gotten wrong? What's been worth the trouble? What was a waste of time? What did we wish we'd documented before we really needed it?

The post Show 250 – How To Document A Network appeared first on Packet Pushers.

The six pillars of Next Generation Endpoint Protection

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Advancements in attack evasion techniques are making new threats extremely difficult to detect. The recent Duqu 2.0 malware, which was used to hack the Iranian nuclear pact discussions, Kaspersky Lab, and an ICS/SCADA hardware vendor, is a prime example. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.To read this article in full or to leave a comment, please click here

The six pillars of Next Generation Endpoint Protection

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Advancements in attack evasion techniques are making new threats extremely difficult to detect. The recent Duqu 2.0 malware, which was used to hack the Iranian nuclear pact discussions, Kaspersky Lab, and an ICS/SCADA hardware vendor, is a prime example. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.

To read this article in full or to leave a comment, please click here

Kaspersky denies faking anti-virus info to thwart rivals

Responding to allegations from anonymous ex-employees, security firm Kaspersky Lab has denied planting misleading information in its public virus reports as a way to foil competitors.“Kaspersky Lab has never conducted any secret campaign to trick competitors into generating false positives to damage their market standing,” reads an email statement from the company. “Accusations by anonymous, disgruntled ex-employees that Kaspersky Lab, or its CEO, was involved in these incidents are meritless and simply false.”MORE: 13 Big Data & Analytics Startups to WatchTo read this article in full or to leave a comment, please click here

Zero-day flaw in Google Admin app allows malicious apps to read its files

An unpatched vulnerability in the Google Admin application for Android can allow rogue applications to steal credentials that could be used to access Google for Work acccounts.One of the main aspects of the Android security model is that apps run in their own sandboxes and cannot read each other’s sensitive data through the file system. There are APIs for applications to interact with each other and exchange data, but this requires mutual agreement.But researchers from security consultancy firm MWR InfoSecurity in the U.K. discovered a flaw in the Google Admin app that could be exploited by potentially malicious applications to break into the app’s sandbox and read its files.To read this article in full or to leave a comment, please click here

Free Windows 10 upgrade will have ‘no financial impact’ on Microsoft

When Microsoft announced that it would be offering consumers a free upgrade to Windows 10, it got a lot of people talking. After all, the company charged $199 per license for consumers to upgrade to Windows 7 Professional just six years ago. So clearly, a free upgrade to a new OS would have to have a big impact on Microsoft’s business, right?Not so much, according to Katherine Egbert, a managing director and senior research analyst at Piper Jaffray. She said in an email that because most people get a new version of Windows when they buy a new computer, the decision to offer free upgrades will have “no financial impact” on Microsoft. The company will still make money from PC manufacturers who have to license Windows 10 for the new hardware that they sell.To read this article in full or to leave a comment, please click here

Spousetivities at VMworld 2015

It’s that time of year again—time for VMworld! And along with VMworld comes another highly-anticipated event: Spousetivities! That’s right, Spousetivities is back again this year for another set of outstanding activities organized for spouses traveling with conference attendees. If your spouse is traveling with you to San Francisco for VMworld, this is a great opportunity for him (or her) to meet up with other spouses and attend some exclusive activities.

So what’s on tap for Spousetivities this year? Here’s a quick look at some of what’s planned:

  • The week will start out with the ever-popular “Getting to Know You” breakfast, held again this year at Jillian’s (right next door to Moscone North). Meet some new folks, eat some great food, and win some great prizes. (Low-fat and gluten-free breakfast options will be available.)
  • Following the breakfast is a cooking class at Sur La Table
  • Not interested in a cooking class? No worries—Monday afternoon also offers a walking city tour that includes an exclusive opportunity to shop at the San Francisco Jewelry Mart and Gift Exchange (not open for regular retail customers!) as well as a stop at the Ferry Building.
  • On Tuesday will the first of two wine Continue reading

Stuff The Internet Says On Scalability For August 14th, 2015

Hey, it's HighScalability time:


Being Google CEO: Nice. Becoming Tony Stark: Priceless (Alphabet)

 

  • $7: WeChat's revenue per user and there are 549 million of them; 60%: Etsy users using mobile; 10: times per second a self-driving car makes a decision; 900: calories in a litre of blood, vampires have very efficient metabolisms; 5 billion: the largest feature in the universe in light years

  • Quotable Quotes:
    • @sbeam: they finally had the Enigma machine. They opened the case. A card fell out. Turing picked it up. "Damn. They included a EULA." #oraclefanfic
    • kordless: compute and storage continue to track with Moore's Law but bandwidth doesn't. I keep wondering if this isn't some sort of universal limitation on this reality that will force high decentralization.
    • @SciencePorn: If you were to remove all of the empty space from the atoms that make up every human on earth, all humans would fit into an apple.
    • @adrianco: Commodity server with 1.4TB of RAM running a mix of 16GB regular DRAM and 128GB Memory1 modules.
    • @JudithNursalim: "One of the most scalable structure in history was the Roman army. Its unit: eight guys; the number of guys that Continue reading