Obama authorizes sanctions against hackers

U.S. President Barack Obama has signed an executive order authorizing the U.S. government to impose sanctions on people, organizations and governments that partake in “malicious cyber-enabled activities” that harm the country.“The same technologies that help keep our military strong are used by hackers in China and Russia to target our defense contractors and systems that support our troops,” Obama said in a statement.The sanctions would target activities that harm critical infrastructure, disrupt computer networks, expose personal information and trade secrets, and entities that profit from information stolen in cyberattacks. The administration will focus on threats from outside the U.S.To read this article in full or to leave a comment, please click here

AWS targets interrupted sessions with virtual desktops upgrade

Amazon Web Services has made its WorkSpaces virtual desktops less annoying to use with a feature that resumes the previous session after it detects an interruption.Today, if users close a laptop lid or lose the network connection, their session will be interrupted and they may be disconnected and have to log back in. But thanks to the auto session resume feature, that’ll be a thing of the past.It might seem like a small upgrade. But if Amazon wants the use of its WorkSpaces to take off on a larger scale, it’s small things like that it has to get right. The default time for resuming a session is 20 minutes, but it can be extended to a maximum of four hours or disabled by the administrator.To read this article in full or to leave a comment, please click here

CloudFlare’s Buenos Aires data center now online

Che, ya estamos en Argentina! It is con placer that we announce our 32nd data center in Buenos Aires, Argentina. Our Buenos Aires data center is our 5th in Latin America following deployments in Santiago, São Paulo, Medellin, and Lima. As of this moment, CloudFlare is now mere milliseconds away from nearly all of Latin America's 300 million Internet users.

Argentina may be better known as the land of bife and malbec, but it is also home to a thriving tech community, including several well known start-up accelerators such as Startup Buenos Aires, Wayra and NXTP Labs (a CloudFlare customer!). At CloudFlare, we know a thing or two about the challenges of building a technology company, and we're proud to support the fast delivery of Internet applications for users in Argentina, as well as those who create them.

Don't cry for me Argentina

Although not commonly known, the title of the famous song from the musical Evita originates from an epitaph on a plaque honoring Evita Peron, and roughly translates as: "Don't cry for me Argentina, I remain quite near to you." Unfortunately, when it comes to the Internet, there is plenty of Continue reading

Is it safe to use public Wi-Fi networks?

Wi-Fi has significantly changed the way we work and play, enabling us to interact with the digital world from anywhere in the physical world. Furthermore, free Wi-Fi access is on the rise, from local coffee shops to international restaurant chains. However, the convenience of free Wi-Fi comes with some real threats, from computer viruses to identity theft.MORE ON NETWORK WORLD: 7 reasons to deploy Wi-Fi security in Enterprise mode Wi-Fi is a type of wireless local area network (WLAN) technology that enables an electronic device such as a laptop or smartphone to exchange data or connect to the Internet using radio waves. The core technology behind Wi-Fi is a device called an access point, which acts like a bridge between the wired network and the Wi-Fi network. The access point, in turn, typically connects to the Internet via a network router.To read this article in full or to leave a comment, please click here

Is it safe to use public Wi-Fi networks?

Wi-Fi has significantly changed the way we work and play, enabling us to interact with the digital world from anywhere in the physical world. Furthermore, free Wi-Fi access is on the rise, from local coffee shops to international restaurant chains. However, the convenience of free Wi-Fi comes with some real threats, from computer viruses to identity theft.

Wi-Fi is a type of wireless local area network (WLAN) technology that enables an electronic device such as a laptop or smartphone to exchange data or connect to the Internet using radio waves. The core technology behind Wi-Fi is a device called an access point, which acts like a bridge between the wired network and the Wi-Fi network. The access point, in turn, typically connects to the Internet via a network router.

To read this article in full or to leave a comment, please click here

SCP File To ASA

Need to do this a few times for some work. It looks like the ASA is a bit picky about how you specify the destination location when you try and do it from a UNIX box.

Enable SSH copy on the ASA

ssh scopy enable

Copy the ASA image from the local directory on your UNIX box to the device.

scp -v asa825-51-k8.bin username@IP_ADDRESS:disk0:asa825-51-k8.bin

If you don’t use this format the UNIX box will give you an error message along the lines of “lost connection”, though the transfer will seem to have completed.


How to monitor Wi-Fi traffic on Android devices

Monitoring or capturing Wi-Fi traffic on Android smartphones and tablets is possible. I’m not just talking about Wi-Fi stumblers or traffic usage apps, but full network sniffers that can capture and display the raw 802.11 network packets from the airwaves. Instead of having to run captures on your bulky laptop, you can walk around with your Android tablet or phone tucked away in your pocket.To read this article in full or to leave a comment, please click here(Insider Story)

6 things Samsung Galaxy S6 does that iPhone 6 can’t

Samsung and Apple are the undisputed kings of the smartphone world, and both own right about 20 percent of the global market, according to recent research from IDC. Apple and the iPhone beat out Samsung and its seemingly endless array of handhelds in total sales to end users for the first time during the final quarter of last year, thanks in no small part to the white-hot market reception of both the iPhone 6 and iPhone 6 Plus.To read this article in full or to leave a comment, please click here

4 things iPhone 6 does that Samsung Galaxy S6 can’t

Samsung and Apple are the undisputed kings of the smartphone world, and both own right approximately 20 percent of the global market, according to recent research from IDC. Apple and the iPhone beat out Samsung and its seemingly endless array of handhelds in total sales to end users for the first time during the final quarter of last year, thanks in no small part to the white-hot market reception of both the iPhone 6 and iPhone 6 Plus.To read this article in full or to leave a comment, please click here

AnsibleFest NYC TIckets Now on Sale

ANS-FEST-NYC15_CIR_horiz_onBLK_72dpi

We are excited to announce the date for AnsibleFest NYC 2015

When: June 4th

Where: Conrad Hotel NYC - 102 North End Ave, New York, NY 10282

AnsibleFest is a day-long conference bringing together Ansible users, developers and industry partners to share best-practices, case studies and Ansible news.  If you are a developer, sysadmin, operations director or devops practioner, AnsibleFest is for you.

Past speakers have included Twitter, Google, Rackspace, EdX, HP, Twilio, Cumulus Networks, Telescope.tv and many more - as well as members of the Ansible Team.





SPECIAL OFFER: Buy an Ansible Tower Starter Kit and get 4 free tickets. Simply enter the promo code festnyc at checkout. BUY NOW 

If you are interested in speaking, please contact [email protected]

If you are interested in sponsoring, please email [email protected] for details

Be sure to follow us on Twitter to stay informed of all of the AnsibleFest news. We'll be announcing some special surprises in the weeks leading up to the event.

 

Google cracks down on ad-injecting Chrome extensions

Google has identified and disabled 192 Chrome browser extensions that injected rogue ads into Web pages opened by users without being upfront about it. The company will scan for similar policy violations in future.The action followed a study that the company conducted together with researchers from University of California Berkeley and which found that more than five percent of Web users who accessed Google websites had an “ad injector” installed.The deceptive Chrome extensions were detected as part of that study, but the researchers also found ad injectors affecting browsers such as Internet Explorer and Mozilla Firefox, on both Windows and Mac OS X.To read this article in full or to leave a comment, please click here

Cisco Introduces Two New Cisco CCIE Logos

Cisco CCIE ABL Logo

Thanks to my contacts in Cisco PR I’m really excited to be able to share the news that Cisco is introducing two new CCIE Logos for 2015, under the title of “CCIE ABL”. If you’re wondering what “ABL” is, it’s not another specialization track, but rather it signifies progress towards the ultimate goal of a CCIE number.

Phillip A. Prull is the Senior VP with the responsibility to oversee the valuable CCIE® brand for Cisco, and he explained to me why Cisco felt that they needed an additional logo:

“One of the things we recognized was that many engineers were working for many months – even years – towards passing our rigorous CCIE® lab exam, but until they finally achieved that success, many of them told us that they felt unable to demonstrate to potential employers that they had made progress towards that goal. In response, we have created a new logo – the Cisco CCIE® ABL™.

Beginning in April 2015, any candidate who has passed a CCIE qualification exam (aka the “written”) will be able to download the new CCIE® ABL™ logo from our Certification Tracking System, and use it on their resumés and business cards, subject to Continue reading

The Upload: Your tech news briefing for Wednesday, April 1

Amazon wants to try putting physical “buy now” buttons all over your houseBecause Jeff Bezos hasn’t yet figured how to wire your brain directly to Amazon’s warehouses, the company is experimenting with cluttering your home with special-purpose buttons in the name of e-commerce. Its new Dash Buttons can be put up anywhere—kitchen, bathroom drawer, broom closet—and programmed to put in a buy order for, say, laundry detergent, by syncing to the Amazon mobile app over the user’s home Wi-Fi network. The devices will go out to Prime customers by invitation only.To read this article in full or to leave a comment, please click here

Acer to bring Chrome OS to an all-in-one PC, as vendors experiment

Desktop devices running Chrome OS haven’t exactly found much traction, but that hasn’t stopped Acer from developing an all-in-one PC built for the Google operating system.On Wednesday, Acer announced its upcoming Chromebase device, just after Google and its partners unveiled a range of new Chrome-related products slated to launch soon.Acer’s Chromebase is set to arrive in the second quarter in North America and Asia Pacific. The all-in-one has a 21.5-inch 1080p touchscreen display and an Nvidia Tegra K1 quad-core processor.To read this article in full or to leave a comment, please click here

Ethernet over Fibre Channel

Since the 80’s, Ethernet has dominated the networking world. The LAN, the WAN, and the MAN are all now dominated by Ethernet links. FIDDI, HIPPI, ATM, Frame Relay, they’ve all gone by the wayside. But there is one protocol that has stuck around to run alongside Ethernet, and that’s Fibre Channel. While Fibre Channel has mostly sat in the shadow of Ethernet, relegated to only storage traffic, it’s now poised to overtake Ethernet in the battle for the LAN. And the way that Fibre Channel is taking on Ethernet is with Ethernet over Fibre Channel.

Slide2

Suck it, Metcalfe

While Ethernet has enjoyed tremendous popularity, it has several (debilitating) limitations. For one, forwarding is haunted the possibility of a loop, and Spanning Tree Protocol is required to keep a watchful eye. Unfortunately, STP is almost as bad as a loop, with the ample opportunity for misconfigurations (rouge root bridges) and other shenanigans.  TRILL, a Layer 2 overlay for Ethernet that allows multi-pathing, hasn’t found its way into a commercial product yet, and its derivatives (FabricPath from Cisco and VCS from Brocade) haven’t seen much in the way of adoption.

Rathern than pile fix upon fix on Ethernet, SAN administrators (known for Continue reading

F5 Data Groups, Wildcards and tmsh

Just a quick note about a problem I ran into with adding data groups to an F5 system using tmsh. I wanted to add a string data group containing a list of URIs mapping to other URIs. This was for use in an iRule that will redirect these URIs.

So I thought that this tmsh script would do the trick:

modify ltm data-group redir_uris records add {"/first-uri" { data "/new-uri"}}
modify ltm data-group redir_uris records add {"/second-uri" { data "/new-uri"}}

Every time I tried it, I got this result:

Syntax Error: the "create" command does not accept wildcard configuration identifiers

Hmm. But I don’t have any wildcards. So what’s the problem? I couldn’t figure it out at the time, and ended up having to resort to manually entering the data group via the web interface. A bit slow, but luckily it was only around 20 entries.

Today I found out what was going wrong: SOL12999: “Data group records beginning with a slash character cannot be added using tmsh.”

Description: You cannot add data group records that begin with a slash ( / ) character to data groups using tmsh.

This issue occurs when all of the following conditions are met:

Arista EOS Available on Whitebox Switches

A few months ago Gigamon did the right thing: they figured out that their true value lies not in the hardware boxes, but in the software running on them, and decided to start offering their GigaVUE-OS on whitebox switches.

So far, Arista is the only other networking vendor that figured out it doesn't make sense to resist the tide - Arista EOS is now available on Open Compute Networking whitebox switches.

Update 2015-04-02: If you followed the links in this blog post, you probably figured out that it’s an April Fools’ one. However, that’s not the end of the story…

Read more ...