Writer rescues Verizon customer in distress

A Virginia woman writes to Christopher Elliott, an author, journalist and consumer advocate who gets results: Help! Verizon lost the cable boxes and remotes I returned to it via UPS after I moved out of my apartment. Now it’s trying to stick me with a $2,000 bill, even though UPS tracking showed it had been delivered, and even though the Verizon representative I spoke to agreed and updated my account to show that they had received the equipment.Here’s the problem: I discarded the UPS tracking information after speaking with the Verizon rep in early December, never dreaming that it would come back to haunt me on my January bill.To read this article in full or to leave a comment, please click here

Kill An SSH Connection

Check what’s connected to the switch first:

#show ssh
%No SSHv1 server connections running.
Connection Version Mode Encryption Hmac State Username
0 2.0 IN aes128-cbc hmac-md5 Session started user1
0 2.0 OUT aes128-cbc hmac-md5 Session started user1
1 2.0 IN aes128-cbc hmac-md5 Session started user1
1 2.0 OUT aes128-cbc hmac-md5 Session started user1

Kill session using “disconnect” command:

#disconnect ssh ?
The number of the active SSH connection
vty Virtual terminal

#disconnect ssh 0


Rand Paul’s bill would overturn US net neutrality rules

U.S. Senator Rand Paul, a Republican presidential candidate, has introduced legislation that would overturn the Federal Communications Commission’s recent net neutrality rules.Paul on Wednesday introduced a resolution of disapproval, a move that allows Congress to review new federal regulations from government agencies, using an expedited legislative process.Paul, of Kentucky, joins House of Representatives Republicans, who introduced their own resolution of disapproval earlier in April. Both bills are largely symbolic. While resolutions of disapproval cannot be filibustered, or blocked, by minority Democrats in the Senate, President Barack Obama would almost certainly veto the efforts.To read this article in full or to leave a comment, please click here

IT/IT: Observations on Ownership

We are clearly moving to a software focused world — this conclusion is almost as inevitable and natural as taking your next breath (or eating that next Little Bits burger — but don’t get the big one unless you’re really hungry).

But, as with all things, there is a flip side to the world going to software. It could actually turn out that the IT world is on the path to becoming our own worst enemies. This, by the way, is what caught my eye this week, and what causes me to rant a little.

The cost and hassle of repairing modern tractors has soured a lot of farmers on computerized systems altogether. In a September issue of Farm Journal, farm auction expert Greg Peterson noted that demand for newer tractors was falling. Tellingly, the price of and demand for older tractors (without all the digital bells and whistles) has picked up. “As for the simplicity, you’ve all heard the chatter,” Machinery Pete wrote. “There’s an increasing number of farmers placing greater value on acquiring older simpler machines that don’t require a computer to fix.”

The issue at stake, at least in the United States, is the Digital Continue reading

iOS 8 now on 4 out of 5 Apple mobile devices

Apple says that iOS 8, released to the public in September, can now be found on 81% of iPhones, iPads and iPod touch devices accessing the Apple Store. That's up from 77% from Apple's March report and up from 68% in January.The iOS 7 edition of Apple's software for iPhones and iPads now accounts for just 17% of devices, with 2% on even older versions, according to Apple on its developer page. Some have balked at moving to iOS 8 because of the space required to download it, while others have been spooked by buggy releases. Apple But iOS 8 has a lot going for it, including that it's compatible with devices as far back as iPhone 4S and iPad 2, from 2011. What's more, people are buying the new iPhone 6 and 6S in droves, with Apple selling 61.2 million units during the the first three months of 2015, way more than the 44 million iPhones it shipped during the same quarter last year.To read this article in full or to leave a comment, please click here

iOS 8 now on 4 out of 5 Apple mobile devices

Apple says that iOS 8, released to the public in September, can now be found on 81% of iPhones, iPads and iPod touch devices accessing the Apple Store. That's up from 77% from Apple's March report and up from 68% in January.The iOS 7 edition of Apple's software for iPhones and iPads now accounts for just 17% of devices, with 2% on even older versions, according to Apple on its developer page. Some have balked at moving to iOS 8 because of the space required to download it, while others have been spooked by buggy releases. Apple But iOS 8 has a lot going for it, including that it's compatible with devices as far back as iPhone 4S and iPad 2, from 2011. What's more, people are buying the new iPhone 6 and 6S in droves, with Apple selling 61.2 million units during the the first three months of 2015, way more than the 44 million iPhones it shipped during the same quarter last year.To read this article in full or to leave a comment, please click here

WordPress e-commerce plug-in puts over 5,000 websites at risk

TheCartPress, an e-commerce plug-in used on thousands of WordPress-based websites, has several high-risk vulnerabilities.There are currently no fixes available for the flaws and, according to its developer, support for the plug-in will be discontinued on June 1st.The vulnerabilities could allow attackers to “execute arbitrary PHP code, disclose sensitive data, and perform Cross-Site Scripting [XSS] attacks against users of WordPress installations with the vulnerable plug-in,” researchers from security firm High-Tech Bridge said in an advisory Wednesday.There are factors that limit the exploitation of some of the flaws, but they still pose a significant risk.To read this article in full or to leave a comment, please click here

An introduction to JavaScript-based DDoS

An introduction to JavaScript-based DDoS

An introduction to JavaScript-based DDoS CloudFlare protects millions of websites from online threats. One of the oldest and most pervasive attacks launched against websites is the Distributed Denial of Service (DDoS) attack. In a typical DDoS attack, an attacker causes a large number of computers to send data to a server, overwhelming its capacity and preventing legitimate users from accessing it.

In recent years, DDoS techniques have become more diversified: attackers are tricking unsuspecting computers into participating in attacks in new and interesting ways. Last year, we saw what was likely the largest attack in history (>400Gbps) performed using NTP reflection. In this attack, the unsuspecting participants were misconfigured NTP servers worldwide. This year, we’re seeing a disturbing new trend: attackers are using malicious JavaScript to trick unsuspecting web users into participating in DDoS attacks.

The total damage that can be caused by a NTP or DNS reflection attack is limited by the number of vulnerable servers. Over time, this number decreases as networks patch their servers, and the maximum size of the attack is capped at the outbound capacity of all the vulnerable servers. For JavaScript-based DDoS, any computer with a browser can be enrolled in the attack, making the potential attack volume nearly Continue reading

PF_RING Deep Dive with Luca Deri on Software Gone Wild

Whenever software switching nerds get together and start discussing the challenges of high-speed x86-based switching, someone inevitably mentions PF_RING, an open-source library that gives you blazingly fast packet processing performance on a Linux server.

I started recording a podcast with Luca Deri, the author of PF_RING, but we diverted into discussing ntopng, Luca’s network monitoring software. We quickly fixed that and recorded another podcast – this time, it’s all about PF_RING, and we discussed these topics:

Read more ...

Why numbering should start at zero?

How does Internet work - We know what is networking

Please note: This has nothing to do with networking in particular! Not if you look from only one perspective. If you look from totally different perspective, with Cisco ACI and all other SDN solutions, you will probably meet with Python programming language (because you will) and then, somewhere in beginning of Python exploration this is the first question that will cross your mind. Of course, if you think like me! Although not directly related to networking, the question bothered me for some time now and the answer is not only really logical when you read it but it is also

Why numbering should start at zero?

Microsoft’s HoloLens adds virtual life to Raspberry Pi 2 gadgets, robots

Microsoft says its HoloLens head-mounted computer can bring robots and gadgets based on Raspberry Pi 2 to life as they are being developed. HoloLens is an augmented-reality headset that lets users interact with 3D objects that show up as floating images, much like holographic projections. By blending computer-generated images with a user's view of the real world, Microsoft wants to change the way we interact with the environment. Microsoft also believes HoloLens can bring a new level of interactivity to enthusiasts making gadgets, robots or appliances using developer boards like the US$35 Raspberry Pi 2. The HoloLens could help makers envision how a gadget would look or how a robot would behave.To read this article in full or to leave a comment, please click here

VCDX-NV Interview: Jason Nash On The Network Virtualization Career Path

Jason_NashJason Nash is CTO of Varrow, a VMware Partner based out of the Carolinas. Previous to Varrow he was an enterprise architect for Wachovia’s investment bank. Jason has been in enterprise IT almost 20 years and originally started as a network admin working with Cisco gear. He maintains his Cisco CCNA and CCNP certifications. He is one of only a handful of double VCDX professionals, having completed his VCDX-NV last year.

When did you first start looking at network virtualization?

I started looking at network virtualization three to four years ago. I think before that, when it was just purely Nicira and some of those types of companies and projects, network virtualization was really the domain of the PayPals, the eBays, the Googles. Those types of companies. When VMware acquired Nicira, when Cisco did their Insieme spin-in, we started to see that commercial and traditional enterprise customers were going to have some very good options around network virtualization. We started to weigh our options and we really started to get serious about it over the last 18 months. Network virtualization ramps up right alongside our automation or orchestration practices and projects. So we believe that to do those properly, you Continue reading

Sony’s smartphone struggles continue as other areas look up

Sony’s CEO Kazuo Hirai has some difficult decisions to make as consumers continue to shun the company’s smartphones, resulting in continued losses.The company on Thursday reported a net loss of ¥126 billion (US$1.1 billion) for its latest fiscal year, which ended on March 31. Year-on-year, Sony’s revenue increased by 5.8 percent to ¥8.2 trillion.Not surprisingly, Sony’s Mobile Communications unit, which develops the Xperia smartphones, gets part of the blame for another year in the red.The future of the mobile division has been very much up in question since a new head of Sony Mobile Communications was appointed in October last year. Sony has announced layoffs and pulled the plug on the PlayStation Mobile platform, but hasn’t been able to turn around its fortunes.To read this article in full or to leave a comment, please click here

Docker Machine Provisioning on AWS

Next up in the docker machine series of integration posts is spinning up some cloud resources on Amazon EC2. The model is the same as previous docker machine posts, boot a VM running as a Docker host, add your cloud credentials for the provider and use your regular docker client commands on the remote Docker host in Amazon. The docker ... The post Docker Machine Provisioning on AWS appeared first on NetworkStatic | Brent Salisbury's Blog.

...

Using Docker Machine to Provision on Microsoft Azure

Microsoft has done a pretty amazing job with Azure over the years. It has been really cool seeing Microsoft embrace Docker and open source in general like they recently have. This post is a continuation of the series on docker machine provisioning to dev hypervisors, DC infra and cloud providers. If you are new to Azure or don’t have an ... The post Using Docker Machine to Provision on Microsoft Azure appeared first on NetworkStatic | Brent Salisbury's Blog.

...

Normalizing the Cloud with Docker Machine

Docker machine creates a virtual machine running Docker located in an array of locations that I can then create containers and ship workloads to. The locations and types you can provision to range from the who is who of cloud computing, workstation resources and traditional on prem local resources sitting in the average enterprise DC. What I get from using ... The post Normalizing the Cloud with Docker Machine appeared first on NetworkStatic | Brent Salisbury's Blog.

...

Amazon buys ClusterK, a firm that helps users buy cloud capacity cheap

Amazon has acquired ClusterK, a developer of software that helps companies run mission-critical applications on spare cloud compute capacity sold by Amazon Web Services.A spokeswoman for AWS confirmed the acquisition, but did not provide further details.Spot instances are spare Amazon EC2 (Elastic Compute Cloud) instances for which users name their price. The price for the spot instances can vary in real-time depending on demand and supply. The instance will run until the spot price exceeds the bid or the user terminates it.This is in contrast with AWS On-Demand instances that let users pay for compute capacity by the hour without long-term commitments, or Reserved instances, which provide capacity reservation. AWS has positioned spot instances as the option to use when customers have flexibility in when their applications can run.To read this article in full or to leave a comment, please click here

Apple says EC probe could lead to back tax payments

Apple has warned that an European probe into its tax payments in Ireland could lead to the company having to pay disputed past taxes covering up to 10 years.The company said the impact could be “material,” but did not provide an estimate.The European Commission began a probe last year into a tax deal between Ireland and Apple to ascertain whether the taxes the company paid complied with European Union rules on state aid.The investigation would address rulings by Irish tax authorities on the calculation of the taxable profit allocated to the Irish branches of Apple Sales International and of Apple Operations Europe, to find out if the rulings involved state aid that benefited the company.To read this article in full or to leave a comment, please click here

Juniper still challenged in switching

Obscured by Juniper’s solid first quarter results were underwhelming results in its enterprise and switching businesses. Switching was off 13% from the first quarter of 2014, while the company’s enterprise business slumped about 10%.Sequentially, switching was off close to 5% and enterprise was down 2% from the fourth quarter of 2014.Still, Juniper posted a quarter that beat estimates and its own revenue and earnings guidance. The results were due to slightly better demand from cloud, cable and European service providers, and demand for routers among large enterprises, particularly those in the government vertical.To read this article in full or to leave a comment, please click here