DEVNET-1001 — Coding 101
How to Call REST APIs from a REST Client and Python
Presenter: Matt (didn't catch last name, sorry)

How to Call REST APIs from a REST Client and Python
Presenter: Matt (didn't catch last name, sorry)
LightCyber Magna Active Breach Detection automatically detects active attackers by identifying the anomalous operational behaviors sourced from compromised hosts in your network. By focusing on actual attack behaviors, and not technical artifacts like signatures, Magna provides accurate breach indicators and eliminates excessive false positives.
The post PQ Show 51 – LightCyber Magna Active Breach Detection – Sponsored appeared first on Packet Pushers Podcast and was written by Ethan Banks.
The Cloonix development team released an update to Cloonix version 26 in May 2015. An important addition in version 26 is a greatly expanded and improved Cloonix user guide.
The new version also changes the user interface, adds a new LAN type, and eliminates the t2t device. It also includes updated guest virtual machines.
In Cloonix Version 26, the user interface eliminates the tool bar and makes all graph objects available via a right-click drop-down menu.
Right-click to access the virtual network object menu
Cloonix v26 KVM configuration window
The only change to the install procedure is a some new prerequisite software packages that must be installed to support compilation.
You can install pre-compiled binaries or compile Cloonix from source code. I prefer to compile it. The source code and the precompiled binaries are on the Cloonix Software page.
To compile the source code on Xubuntu 14.04, I followed the procedure documented in the Cloonix install documentation.
We will install Cloonix v26 in our Home directory. Download and unpack the source code.
How does Internet work - We know what is networking
This one is long. Do not be afraid though, I made it just to give you the fastest way to deploy functional dot1x to your company HQ without reading even more documentation and searching for those little timer default settings. I the article prior to this I showed you how to setup your environment with simple dot1x and make it as simple as possible. I will not repeat again the part about setting up Radius Clients on server side, everything else is here once again just more complex. Now is time for a more complex example that will make your implementation
If you’ve visited the Brocade website recently, you’ve probably seen the “Free NFV Certification” banner. I signed up for this several months ago, but had put off completing the course. I had a little downtime recently prior to starting work at Brocade, so I completed this course & exam. Here’s my impressions.
From the official documentation:
As a Brocade Certified vRouter Engineer, you must be able to demonstrate the ability to install, configure and troubleshoot features of Brocade Vyatta Network OS.
i.e. it’s primarily about the basics of Vyatta.
Here’s what you get when you sign up:
Note that you can run the Vyatta image on a local hypervisor, or if you prefer you can select it from the AWS marketplace. Personally I ran it on VMware Fusion on my laptop. It’s light on resource, so you can easily spin up several Continue reading
On this week's Citizens of Tech podcast, we conclude our special on how complex games are developed. Regular host Eric Sutphen (@zutfen) and special guest Jeff Pugliese (@tpyowritr) continue their interview with game developers Tim Anderson and Giovanni Martello from Saga of Lucimia. Topics include community, archetypes, and character progression.
The post Citizens of Tech 006 – Saga of Lucimia Special, Part 2 appeared first on Packet Pushers.
On this week's Citizens of Tech podcast, we conclude our special on how complex games are developed. Regular host Eric Sutphen (@zutfen) and special guest Jeff Pugliese (@tpyowritr) continue their interview with game developers Tim Anderson and Giovanni Martello from Saga of Lucimia. Topics include community, archetypes, and character progression.
The post Citizens of Tech 006 – Saga of Lucimia Special, Part 2 appeared first on Packet Pushers Podcast and was written by Ethan Banks.
One of the worst parts of the day has to be calling AT&T or Comcast to request a dispatch to a branch office or to check up on a problem internet circuit. Yelling out “Technical Support” to try and get past the prompts. The first question I get asked every time, “Did you reboot the modem?”. […]
The post Managed power supplies and how to automate your branch network appeared first on Packet Pushers Podcast and was written by William Marti.
For best article visual quality, open Soviet Mi-24V Hind E, 1/72 scale directly at NetworkGeekStuff.
The Mil Mi-24 (Russian: Миль Ми-24; NATO reporting name: Hind) is a large helicopter gunship and attack helicopter and low-capacity troop transport with room for eight passengers. It is produced by Mil Moscow Helicopter Plant and has been operated since 1972 by the Soviet Air Force and its successors, along with more than 30 other nations.
In NATO circles, the export versions, Mi-25 and Mi-35, are denoted with a letter suffix as “Hind D” and “Hind E” respectively. Soviet pilots called the Mi-24 the “flying tank”, or летающий танк (letayushchiy tank). More common unofficial nicknames were “Crocodile” (Крокодил or Krokodil) due to the helicopter’s camouflage scheme and “Drinking Glass” (Стакан or Stakan) because of the flat glass plates which surround the cockpit of the Mi-24.
In my small interpretation, I have used the Revell kid that was released in 2014 targeting the Czech Air Force variant, but it also has the option of doing Soviet markings, so I decided to go with this much more generally known view as I have a certain nostalgia on this thing appearing in the old Operation Flashpoint (2001) by Continue reading
$18M for software-defined storage, and good news for SD-WAN and white-box servers.
How does Internet work - We know what is networking
If your LAN is extending to some places where unauthorised people can just plug in and gain access to your protected network, it’s time to implement some security on your access switch. The best thing to do is to implement IEEE 802.1X port-based authentication which will enable users/machine authentication and prevent unauthorized devices from getting access switch port running when connected. IEEE 802.1X port-based authentication is mostly called simply as dot1x. In this article I will show you how to configure some basic dot1x stuff on switch side. I will also include Windows machine side of configuration as this is something most people presume
Re-New. Again. Greetings. Welcome to my first blog post. I have to say, I feel a little out of my class in the esteemed collection of networking talent I see blogging on this site. I have never been the top tier of networking. I have never been the guy who just seems to know everything. […]
The post Re-New. Again appeared first on Packet Pushers Podcast and was written by Doug Sheehan.
Please join us in congratulating the following iPexpert students who have passed their CCIE lab!
Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!