Vendors lay groundwork for 5G with greener and faster mobile networks

A new generation of mobile network equipment comes with lofty promises of better coverage and performance for subscribers, by making it easier for operators to add more capacity and support for new radio technologies.Mobile operators are facing a number of challenges, starting with building networks that won’t get overwhelmed by traffic growth mainly driven by video. The most straightforward way of doing this is adding more spectrum—or lanes, if you will—to their networks. It isn’t a coincidence that the recent AWS (Advanced Wireless Service) spectrum auction in the U.S. was a blockbuster and that operators want to use Wi-Fi frequencies for LTE.To read this article in full or to leave a comment, please click here

Extracting the SuperFish certificate

I extracted the certificate from the SuperFish adware and cracked the password ("komodia") that encrypted it. I discuss how down below. The consequence is that I can intercept the encrypted communications of SuperFish's victims (people with Lenovo laptops) while hanging out near them at a cafe wifi hotspot. Note: this is probably trafficking in illegal access devices under the proposed revisions to the CFAA, so get it now before they change the law.


I used simple reversing to find the certificate. As reported by others, program is packed and self-encrypted (like typical adware/malware). The proper way to reverse engineer this is to run the software in a debugger (or IDApro), setting break point right after it decrypts itself. The goal is to set the right break point before it actually infects your machine -- reversers have been known to infect themselves this way.

The ghetto way is to just to run this on a machine, infecting yourself, and run "procdump" (by @markrussinovich) in order to dump the process's memory. That's what I did, by running the following command:
procdump -ma VisualDiscovery.exe super.dmp
The proper reversing is to actually tear apart the memory structures, such Continue reading

Sprint and T-Mobile defend unlocking policies

Sprint and T-Mobile separately defended their smartphone and tablet unlocking policies on Wednesday following criticism from independent researcher Sina Khanifar.Sprint in a short statement said that as of Feb. 11, it had "implemented all six of the principles contained in the CTIA [Consumer Code] unlocking agreement, and we appreciate the FCC's recognition that the country's major providers have met their commitment."The FCC last week applauded carriers for meeting voluntary unlocking principals by the Feb. 11 deadline.To read this article in full or to leave a comment, please click here

The Cisco CNPES Cert, First Exam (600-504) and Course

Do you think of yourself as a network engineer? Cisco’s Network Programmability Engineer Specialist (CPNES) certification represents Cisco’s first crack at a certification focused on network engineering in an SDN world. Today’s post begins to examine this certification by looking at the first of the two required exams: the 600-504 NPENG exam. We’ll look at both the exam and a related video course.

Other posts in this series:

Overview

First, to set the stage, Cisco currently offers four network programmability certifications. Loosely you can think of these as two networking-focused certs, and two development-focused certs, based on job roles. For the two networking-focused certs, one focuses on design, while one (the one discussed here) looks at engineering and implementation.

Figure 1: Overview of Cisco SDN Certifications

 

Today’s post focuses on the cisco network programmability engineering specialist (CNPES) cert, and specifically the first exam: the 600-504 NPENG exam. Basically, the NPENG exam covers SDN implementation but excludes ACI, while the second required exam, 600-512 NPENGACI, includes ACI.

This list provides the links for more details – for the certification, each of the two exams, and each of Cisco’s two Continue reading

Lenovo PCs ship with adware that puts computers at risk

Some Windows laptops made by Lenovo come pre-loaded with an adware program that exposes users to security risks.The software, Superfish Visual Discovery, is designed to insert product ads into search results on other websites, including Google.However, since Google and some other search engines use HTTPS (HTTP Secure), the connections between them and users’ browsers are encrypted and cannot be manipulated to inject content.To overcome this, Superfish installs a self-generated root certificate into the Windows certificate store and then acts as a proxy, re-signing all certificates presented by HTTPS sites with its own certificate. Because the Superfish root certificate is placed in the OS certificate store, browsers will trust all fake certificates generated by Superfish for those websites.To read this article in full or to leave a comment, please click here

9 futuristic display technologies

9 far-out future display technologiesImage by Pawel GaulFor decades, there was exactly one way to look at electronically displayed text and images: the cathode ray tube. This hardworking, stalwart technology was the display of choice for everything, from radar systems in the 1940s all the way to desktop PCs in the 1990s, with millions of heavy, fragile cabinet TVs in between.To read this article in full or to leave a comment, please click here

How machine learning ate Microsoft

At the Strata big data conference yesterday, Microsoft let the world know its Azure Machine Learning offering was generally available to developers. This may come as a surprise. Microsoft? Isn't machine learning the province of Google or Facebook or innumerable hot startups?In truth, Microsoft has quietly built up its machine learning expertise over decades, transforming academic discoveries into product functionality along the way. Not many businesses can match Microsoft's deep bench of talent.[ See what hardware, software, development tools, and cloud services came out on top in the InfoWorld 2015 Technology of the Year Awards. | Download the entire list of winners in the handy Technology of the Year PDF. | Stay up on key Microsoft technologies with InfoWorld's Microsoft newsletter. ] Machine learning -- getting a system to teach itself from lots of data rather than simply following preset rules -- actually powers the Microsoft software you use everyday. Machine learning has infiltrated Microsoft products from Bing to Office to Windows 8 to Xbox games. Its flashiest vehicle may be the futuristic Skype Translator, which handles two-way voice conversations in different languages.To read this article in full or to leave a comment, please click here

Salesforce brings more analytics power to mobile business users

Analytics is not a domain everyone’s brain can adapt to easily. Combining statistics, data visualization, operations research, programming savvy and more, the field has relied largely on specialists to make its data-focused interpretations useful in the practical sphere.That, however, is slowly changing. Along with the rise of Big Data, efforts are increasingly emerging to put the power of analytics in the hands of business managers, often using the tools for mobile devices that are popular today.A case in point is Salesforce.com’s Wave Analytics Cloud, which the company updated Thursday.To read this article in full or to leave a comment, please click here

NTT to roll out indoor navigation using smartphone sensors

Japanese mobile carrier NTT DoCoMo wants to go beyond GPS with a more granular smartphone navigation system for complex indoor spaces.DoCoMo has partnered with mapping company Zenrin DataCom to develop the navigation system that makes use of sensors in smartphones. It’s designed to help users find their way through Japan’s dense indoor spaces such as subway complexes or underground malls where GPS signals may not reach.Japan has some of the busiest and largest rail hubs in the world, with multiple floors, overlapping rail lines and subterranean shopping arcades. The new platform uses smartphone motion sensors to track direction when a user walks around. The data is plotted against preloaded maps from Zenrin, which supplies mapping apps for all DoCoMo mobile phones.To read this article in full or to leave a comment, please click here

HP latest to unbundle switch hardware, software

HP has joined the disaggregation party through two partnerships that will produce a branded white box switch capable of running multiple network operating systems.HP has expanded a relationship with Accton Technology to offer two new switches initially, and more later this year. The switches will be low-cost, software-independent white box hardware targeted at Web scale data centers supporting cloud, mobile, social media and big data workloads.Under a second arrangement, HP will offer Cumulus Networks’ Cumulus Linux network operating system on the Accton switches. Cumulus Linux runs on a variety of white box and branded switching hardware based on merchant silicon, and is intended to make the software side of networking hardware independent.To read this article in full or to leave a comment, please click here

HP latest to unbundle switch hardware, software

HP has joined the disaggregation party through two partnerships that will produce a branded white box switch capable of running multiple network operating systems.HP has expanded a relationship with Accton Technology to offer two new switches initially, and more later this year. The switches will be low-cost, software-independent white box hardware targeted at Web scale data centers supporting cloud, mobile, social media and big data workloads.Under a second arrangement, HP will offer Cumulus Networks’ Cumulus Linux network operating system on the Accton switches. Cumulus Linux runs on a variety of white box and branded switching hardware based on merchant silicon, and is intended to make the software side of networking hardware independent.To read this article in full or to leave a comment, please click here

The cloud journey continues: HP and Cumulus Networks

Is open networking mainstream?

If the HP announcement of new data center networking solutions with Cumulus Linux is any indication, then we will venture to answer.

Yes.

On Feb. 19, HP announced a partnership with Cumulus Networks for new HP open network switches with Cumulus Linux, the operating system for open networking. HP has designed an efficient supply chain model including a joint venture with Accton, delivery worldwide via HP logistics centers, and HP local sales and support.

Open networking was born when web-scale providers developed proprietary cloud networking that reduced CapEx costs while improving OpEx and enabling automation.  Similarly, hosting companies, service providers and high-tech firms re-architected their data centers realizing similar benefits.  Next, financials, government, and education entities found affordable capacity and new innovation opportunities with their cloud journey.  Today, a broad range of enterprises are adopting open networking for a wide set of use cases – and for automation and rapid service delivery using Linux tools already standardized for servers.

In that context, the new HP open network switch offerings with Cumulus Linux address a range of use cases but the sweet spot is hyper-scale data center operators. Of course HP also offers the servers, storage and Continue reading

The Upload: Your tech news briefing for Thursday, February 19

Samsung pushes into mobile payments with LoopPay acquisitionSamsung Electronics is stepping up to Apple and Google on the mobile payments front: On Wednesday it said it would buy LoopPay and roll it into its mobile division. The Massachusetts startup’s technology is, like competitors, basically a virtual wallet for payment cards, but it works with existing magnetic card readers in the U.S.Qualcomm getting set to roll out 64-bit mobile chipsQualcomm is readying new chips for mobile devices that are the first to implement its homegrown 64-bit architecture. The design will appear first in high-end Snapdragon chips for premium products, and test units will be shipping by the end of the year.To read this article in full or to leave a comment, please click here

The Upload: Your tech news briefing for Thursday, February 19

Samsung pushes into mobile payments with LoopPay acquisitionSamsung Electronics is stepping up to Apple and Google on the mobile payments front: On Wednesday it said it would buy LoopPay and roll it into its mobile division. The Massachusetts startup’s technology is, like competitors, basically a virtual wallet for payment cards, but it works with existing magnetic card readers in the U.S.Qualcomm getting set to roll out 64-bit mobile chipsQualcomm is readying new chips for mobile devices that are the first to implement its homegrown 64-bit architecture. The design will appear first in high-end Snapdragon chips for premium products, and test units will be shipping by the end of the year.To read this article in full or to leave a comment, please click here

Japan’s curious love for old-school flip-phones continues

Outmoded technology dies hard in futuristic Japan.Telegrams remain popular, the fax machine industry is alive and well and now shipments of feature phones are on the rise.For the first time in seven years, shipments of old-school flip phones increased in 2014 while those of smartphones fell. While it may be a statistical anomaly, Japan’s flip phones are highly evolved devices with unique features that keep them popular.Feature phones notched a 5.7 percent gain last year to 10.5 million units, compared to a 5.3 percent drop in smartphone shipments to 27.7 million, according to MM Research Institute (MMRI), which noted that Apple retains a dominant smartphone share of about 60 percent. The MMRI study followed feature phones, which in Japan consist mainly of flip phones,To read this article in full or to leave a comment, please click here

Why oh why?

So i have been using Juniper MX routers for some years now (mainly MX80’s) and have configured CoS in reasonably basic forms to suit $dayjob’s needs (mainly 4 queues). It turns out that even though the MX routers support 8 … Continue reading

Kubernetes 101 – External access into the cluster

In our last post, we looked at how Kubernetes handles the bulk of it’s networking.  What we didn’t cover yet, was how to access services deployed in the Kubernetes cluster from outside the cluster.  Obviously services that live in pods can be accessed directly as each pod has its own routable IP address.  But what if we want something a little more dynamic?  What if we used a replication controller to scale our web front end? We have the Kubernetes service, but what I would call its VIP range (Portal Net) isn’t routable on the network.  There are a couple of ways to solve this problem.  Let’s walk through the problem and talk about a couple of ways to solve it.  I’ll demonstrate the way I chose to solve it but that doesn’t imply that there aren’t other better ways as well.

As we’ve seen, Kubernetes has a built-in load balancer which it refers to as a service.  A service is group of pods that all provide the same function.  Services are accessible by other pods through an IP address which is allocated out of the clusters portal net allocation.  Continue reading

The Cisco CNPES Cert, First Exam (600-504) and Course

Do you think of yourself as a network engineer? Cisco’s Network Programmability Engineer Specialist (CPNES) certification represents Cisco’s first crack at a certification focused on network engineering in an SDN world. Today’s post begins to examine this certification by looking at the first of the two required exams: the 600-504 NPENG exam. We’ll look at both the exam and a related video course.

Other posts in this series:

Overview

First, to set the stage, Cisco currently offers four network programmability certifications. Loosely you can think of these as two networking-focused certs, and two development-focused certs, based on job roles. For the two networking-focused certs, one focuses on design, while one (the one discussed here) looks at engineering and implementation.

Figure 1: Overview of Cisco SDN Certifications

 

Today’s post focuses on the cisco network programmability engineering specialist (CNPES) cert, and specifically the first exam: the 600-504 NPENG exam. Basically, the NPENG exam covers SDN implementation but excludes ACI, while the second required exam, 600-512 NPENGACI, includes ACI.

This list provides the links for more details – for the certification, each of the two exams, and each of Cisco’s two Continue reading

Some notes on SuperFish

What's the big deal?

Lenovo, a huge maker of laptops, bundles software on laptops for the consumer market (it doesn't for business laptops). Much of this software is from vendors who pay Lenovo to be included. Such software is usually limited versions, hoping users will pay to upgrade. Other software is add supported. Some software, such as the notorious "Ask.com Toolbar", hijacks the browser to display advertisements.

Such software is usually bad, especially the ad-supported software, but the SuperFish software is particularly bad. It's designed to intercept all encrypted connections, things is shouldn't be able to see. It does this in a poor way that it leaves the system open to hackers or NSA-style spies.

Marc Rogers has a post where he points out that what the software does is hijack your connections, monitors them, collects personal information, injects advertising into legitimate pages, and causes popup advertisement.

What's the technical detail?

It does two things. The first is that SuperFish installs a transparent-proxy (MitM) service on the computer intercepting browser connections. I don't know the details of exactly how they do this, but Windows provides easy hooks for such interception.

But such interception still cannot decrypt SSL. Therefore, SuperFish Continue reading