When stolen data can ‘phone home’

Tracking devices is nothing new. In the auto industry, multiple vendors compete to convince drivers to install the devices in their cars, promising that if it gets stolen, the cops will know right where to find it. In law enforcement, criminals on probation sometimes are required to wear an ankle bracelet that does the same thing – tells authorities exactly where they are. It is also possible to do that with data. Digital watermarking can track where it is being viewed or downloaded, and also identify the IP address and the type of device doing it. It is not in widespread use, according to experts, and could in some cases have privacy implications, but its advocates say while it doesn’t prevent a data breach, it can let an organization that has been breached know about it almost immediately, instead of months later.To read this article in full or to leave a comment, please click here

On being different

The METNAV shop at McGuire AFB was hard to miss, if you could get into the right area, and you know what you were looking for. Out across the flightline, across the old 18 runway, and across a winding series of roads, a small squat building sat — no antennas or other identifying marks. Just plain, white, one story, with a small parking lot and a few trucks, either camouflaged or USAF blue. Driving into the parking lot, you’d find an odd collection of vehicles, but many of us drove 4wd’s of some sort. A good number of the pieces of equipment we worked on were only reachable through off road routes. If you owned a 4wd vehicle, the fateful pager call at 2am didn’t require a trip to the shop, across the flight line, old runways, and in the winter piles of snow pushed up against the sides of the airplane routes, to get a truck usable to reach the failed piece of equipment.

In the line of cars, you would see one that was, well, different. This particular car was, in fact, the subject of a number of discussions in the shop — you’d almost think our little Continue reading

The Upload: Your tech news briefing for Monday, July 20

Samsung’s Galaxy Tab S2 is thinnest and lightest yetSamsung said Monday that its new Android tablets go on sale next month and the lighter, trimmed down products will offer consumers an alternative to Apple’s iPad Air 2. There are 9.7-inch and 8-inch models with a 2048 by 1536 pixel Super AMOLED screen; both come with a fingerprint scanner, along with Samsung’s eight-core chip, which has two quad-core processors, one running at 1.9GHz, the other at 1.3 GHz.Some drones deliver medicine, others interfere with firefightersTo read this article in full or to leave a comment, please click here

knowing stuff

Knowing Stuff. I have to admit, this second post is not as technical as I would prefer, but something that is on my mind a lot. How do we know what we know. How do we constantly work on what is as essential to us as air. Is it the same for everyone, or is […]

Author information

Doug Sheehan

Doug Sheehan has been an IT/Network Tech for what seems like a long time. Most of his career has been directly or indirectly connecting to routers and switches. His work in Alaska focused on layer2/layer 3 connections over satellites, since there are still no roads to most places. He now works on automation networks on the little island off the big island, where he lives with his beautiful wife and two dogs.
Having overslept the three years to update his CCNA, He now finds himself beginning the certification journey again from the start. He also has unrealized potential in programming and BSD.
His website is at dougsheehan.com

The post knowing stuff appeared first on Packet Pushers Podcast and was written by Doug Sheehan.

New products of the week 07.20.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Proficio ProSOC ExpressKey features: ProSOC Express provides SMBs with 24x7 enterprise-class security monitoring and alerting services. Offered as a highly affordable SaaS subscription service, it includes the same advanced SIEM technology and 24x7 expert monitoring that Proficio provides to its enterprise customers. More info.To read this article in full or to leave a comment, please click here

New products of the week 07.20.2015

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Proficio ProSOC ExpressKey features: ProSOC Express provides SMBs with 24x7 enterprise-class security monitoring and alerting services. Offered as a highly affordable SaaS subscription service, it includes the same advanced SIEM technology and 24x7 expert monitoring that Proficio provides to its enterprise customers. More info.To read this article in full or to leave a comment, please click here

Review: Best tools for email encryption

Email encryptionRecipients of encrypted emails once had to share the same system as the sender. Today, products have a “zero knowledge encryption” feature, which means you can send an encrypted message to someone who isn’t on your chosen encryption service. Today’s products make sending and receiving messages easier, with advances like an Outlook or browser plug-in that gives you nearly one-button encryption. And the products we reviewed have features like setting expiration dates, being able to revoke unread messages or prevent them from being forwarded. (Read the full review.)To read this article in full or to leave a comment, please click here

Best tools for email encryption

Email encryptionRecipients of encrypted emails once had to share the same system as the sender. Today, products have a “zero knowledge encryption” feature, which means you can send an encrypted message to someone who isn’t on your chosen encryption service. Today’s products make sending and receiving messages easier, with advances like an Outlook or browser plug-in that gives you nearly one-button encryption. And the products we reviewed have features like setting expiration dates, being able to revoke unread messages or prevent them from being forwarded. (Read the full review.)To read this article in full or to leave a comment, please click here

REVIEW: Email encryption has gotten so much better, so you’d be crazy not to use it

I once co-wrote a book on enterprise email where I likened email encryption to a “sucking chest wound.” That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least. While things have improved considerably since then, encrypting messages is not as simple as it could be, and requires careful study if you want to have truly private communications that can’t be viewed by your competitors – or your government. In the past, recipients of encrypted emails had to share the same system as the sender, and many email clients were difficult to configure. Today, many products have a “zero knowledge encryption” feature, which means you can send an encrypted message to someone who isn’t on your chosen encryption service. Just provide them a passphrase to decrypt their message and to compose a reply to you, or in some cases they can read the message by just authenticating themselves. After this first communication, your recipient is able to exchange encrypted messages with you quite easily.To read this article in full or to leave a comment, please click here(Insider Story)

Yet Another blog about Segment Routing -Part2 : TI-LFA

So finally got some time after a while to write something. In this post we will be looking at Topology Independent LFA aka TI-LFA. We will also compare TI-LFA with LFA, rLFA and TE-FRR. If you don’t already have familiarity with LFA’s or TE-FRR then take a look at my previous posts on TE design […]

Author information

Diptanshu Singh

Diptanshu Singh

Diptanshu Singh,(3xCCIE,CCDE) is a Sr. Engineer mostly focused on service providers , data center and security. He is a network enthusiast passionate about network technologies so not only is it his profession, but something of a hobby as well.

The post Yet Another blog about Segment Routing -Part2 : TI-LFA appeared first on Packet Pushers Podcast and was written by Diptanshu Singh.

Docker Experimental Networking – 1

Networking support in Docker was primitive till now. Single host connectivity was through Linux bridge and there was no native mechanism to connect Containers across hosts. With Pipework, we could do a hacky approach to connect Containers across hosts. Companies like Socketplane, Weave have been working to address this Networking gap. I have written multiple … Continue reading Docker Experimental Networking – 1

Docker Experimental Networking – 1

Networking support in Docker was primitive till now. Single host connectivity was through Linux bridge and there was no native mechanism to connect Containers across hosts. With Pipework, we could do a hacky approach to connect Containers across hosts. Companies like Socketplane, Weave have been working to address this Networking gap. I have written multiple … Continue reading Docker Experimental Networking – 1