The Week in Internet News: Cambodia Creates Its Own Great Firewall

Traffic cops: The government of Cambodia has moved to establish a national Internet gateway with a single point of entry for traffic into the country, regulated by a government-appointed operator, The Diplomat reports. The Washington Post’s editorial board said the move “strikes at one of the nation’s last vestiges of democratic life.” The move also points to a larger threat to “the entire globe,” led by censorship efforts in China, the editorial board wrote. “China wishes to establish a freedom-crushing model of cyber-sovereignty by which every country sets its own rules for a Web that serves those in power, rather than the people, without any regard for civil liberties or due process of law.”

A deal on the news: Facebook had prohibited Australian users from sharing news on the social media site because of a proposal that would require it and other online services to pay news outlets, but the company has reached a deal with the government there that again allows users to post news articles, the New York Times reports. The deal allows more time for negotiations, but the Australian Senate passed the law anyway, CNet reports.

Help with the bills: The U.S. Federal Communications Continue reading

The Teams Dashboard: Behind the Scenes

The Teams Dashboard: Behind the Scenes
The Teams Dashboard: Behind the Scenes

Back in 2010, Cloudflare was introduced at TechCrunch Disrupt as a security and performance solution that took the tools of the biggest service providers and made them available to anyone online. But simply replicating these tools wasn’t enough — we needed to make them ridiculously easy to use.

When we launched Cloudflare for Teams almost ten years later, the vision was very much the same — build a secure and powerful Zero Trust solution that is ridiculously easy to use. However, while we talk about what we’re building with a regular cadence, we often gloss over how we are designing Cloudflare for Teams to make it simple and easy to use.

In this blog post we’ll do just that — if that sounds like your jam, keep scrolling.

Building a house

First, let's back up a bit and introduce Cloudflare for Teams.

We launched Cloudflare for Teams in January, 2020. With Teams, we wanted to alleviate the burden Cloudflare customers were feeling when trying to protect themselves and their infrastructure from threats online. We knew that continuing to rely on expensive hardware would be difficult to maintain and impractical to scale.

At its core, Teams joins two products together — Continue reading

IBM brings Red Hat to Power Systems

IBM has introduced Red Hat Linux on its RISC-based Power Systems servers, further expanding IBM's private- and hybrid-cloud offerings on the traditionally Unix-based hardware.IBM already has what it calls Enterprise Linux on Power, but this is bringing Red Hat, which IBM paid $34 billion to acquire, to its big iron. IBM Power Systems now feature Red Hat OpenShift on IBM Power Virtual Server leveraging OpenShift's bare metal installer, Red Hat Runtimes, and newly certified Red Hat Ansible Content Collections.Red Hat OpenShift on IBM Power Virtual Server is a move to bring the OpenShift container platform to IBM Power Virtual Server. The IBM Power Virtual Server is an enterprise infrastructure-as-a-service offering built around IBM POWER9 and offering access to more than 200 IBM Cloud services. In addition, IBM Power Virtual Server clients can now run business applications like SAP HANA in an IBM POWER9-based cloud.To read this article in full, please click here

Creating and merging PDFs on Linux

There are a number of ways that you can create PDFs on a Linux system. You can use an application like LibreOffice or OpenOffice, or you can take advantage of any of a number of commands that can generate PDFs from text files or from a group of other file formats. There are also a number of ways that you can merge a group of PDFs into a single PDF file.Why PDFs? PDF is often the preferred format for files that you need to share with others or archive. This is because PDF is an open file format, which makes sharing these files between diverse systems and devices possible.Using LibreOffice or OpenOffice Both LibreOffice and OpenOffice can export files as PDFs. You can open an existing document or create a new document and export it as a PDF. OpenOffice's Export as PDF… and LibreOffice's Export As => Export as PDF… will do what is required to convert your file.To read this article in full, please click here

Creating and merging PDFs on Linux

There are a number of ways that you can create PDFs on a Linux system. You can use an application like LibreOffice or OpenOffice, or you can take advantage of any of a number of commands that can generate PDFs from text files or from a group of other file formats. There are also a number of ways that you can merge a group of PDFs into a single PDF file.Why PDFs? PDF is often the preferred format for files that you need to share with others or archive. This is because PDF is an open file format, which makes sharing these files between diverse systems and devices possible.Using LibreOffice or OpenOffice Both LibreOffice and OpenOffice can export files as PDFs. You can open an existing document or create a new document and export it as a PDF. OpenOffice's Export as PDF… and LibreOffice's Export As => Export as PDF… will do what is required to convert your file.To read this article in full, please click here

IBM brings Red Hat to Power systems

IBM has introduced Red Hat Linux on its RISC-based Power systems, further expanding IBM's private- and hybrid-cloud offerings on the traditionally Unix-based hardware.IBM already has what it calls Enterprise Linux on Power, but this is bringing Red Hat, which IBM paid $34 billion to acquire, to its big iron. IBM Power systems now feature Red Hat OpenShift on IBM Power Virtual Server leveraging OpenShift's bare metal installer, Red Hat Runtimes, and newly certified Red Hat Ansible Content Collections.Red Hat OpenShift on IBM Power Virtual Server is a move to bring the OpenShift container platform to IBM Power Virtual Server. The IBM Power Virtual Server is an enterprise infrastructure-as-a-service offering built around IBM POWER9 and offering access to more than 200 IBM Cloud services. In addition, IBM Power Virtual Server clients can now run business applications like SAP HANA in an IBM POWER9-based cloud.To read this article in full, please click here

Rant: Cisco ACI Complexity

A while ago Antti Leimio wrote a long twitter thread describing his frustrations with Cisco ACI object model. I asked him for permission to repost the whole thread as those things tend to get lost, and he graciously allowed me to do it, so here we go.


I took a 5 days Cisco DCACI course. This is all new to me. I’m confused. Who is ACI for? Capabilities and completeness of features is fantastic but how to manage this complex system?

Rant: Cisco ACI Complexity

A while ago Antti Leimio wrote a long twitter thread describing his frustrations with Cisco ACI object model. I asked him for permission to repost the whole thread as those things tend to get lost, and he graciously allowed me to do it, so here we go.


I took a 5 days Cisco DCACI course. This is all new to me. I’m confused. Who is ACI for? Capabilities and completeness of features is fantastic but how to manage this complex system?

We are living in 1984 (ETERNALBLUE)

In the book 1984, the protagonist questions his sanity, because his memory differs from what appears to be everybody else's memory.

The Party said that Oceania had never been in alliance with Eurasia. He, Winston Smith, knew that Oceania had been in alliance with Eurasia as short a time as four years ago. But where did that knowledge exist? Only in his own consciousness, which in any case must soon be annihilated. And if all others accepted the lie which the Party imposed—if all records told the same tale—then the lie passed into history and became truth. ‘Who controls the past,’ ran the Party slogan, ‘controls the future: who controls the present controls the past.’ And yet the past, though of its nature alterable, never had been altered. Whatever was true now was true from everlasting to everlasting. It was quite simple. All that was needed was an unending series of victories over your own memory. ‘Reality control’, they called it: in Newspeak, ‘doublethink’.

I know that EternalBlue didn't cause the Baltimore ransomware attack. When the attack happened, the entire cybersecurity community agreed that EternalBlue wasn't responsible.

But this New York Times article said otherwise, blaming the Continue reading

Review: Perlroth’s book on the cyberarms market

New York Times reporter Nicole Perlroth has written a book on zero-days and nation-state hacking entitled “This Is How They Tell Me The World Ends”. Here is my review.


I’m not sure what the book intends to be. The blurbs from the publisher implies a work of investigative journalism, in which case it’s full of unforgivable factual errors. However, it reads more like a memoir, in which case errors are to be expected/forgivable, with content often from memory rather than rigorously fact checked notes.


But even with this more lenient interpretation, there are important flaws that should be pointed out. For example, the book claims the Saudi’s hacked Bezos with a zero-day. I claim that’s bunk. The book claims zero-days are “God mode” compared to other hacking techniques, I claim they are no better than the alternatives, usually worse, and rarely used.


But I can’t really list all the things I disagree with. It’s no use. She’s a New York Times reporter, impervious to disagreement.


If this were written by a tech journalist, then criticism would be the expected norm. Tech is full of factual truths, such as whether 2+2=5, where it’s possible for a thing to be Continue reading

Flow-based monitoring for Magic Transit

Flow-based monitoring for Magic Transit
Flow-based monitoring for Magic Transit

Network-layer DDoS attacks are on the rise, prompting security teams to rethink their L3 DDoS mitigation strategies to prevent business impact. Magic Transit protects customers’ entire networks from DDoS attacks by placing our network in front of theirs, either always on or on demand. Today, we’re announcing new functionality to improve the experience for on-demand Magic Transit customers: flow-based monitoring. Flow-based monitoring allows us to detect threats and notify customers when they’re under attack so they can activate Magic Transit for protection.

Magic Transit is Cloudflare’s solution to secure and accelerate your network at the IP layer. With Magic Transit, you get DDoS protection, traffic acceleration, and other network functions delivered as a service from every Cloudflare data center. With Cloudflare’s global network (59 Tbps capacity across 200+ cities) and <3sec time to mitigate at the edge, you’re covered from even the largest and most sophisticated attacks without compromising performance. Learn more about Magic Transit here.

Using Magic Transit on demand

With Magic Transit, Cloudflare advertises customers’ IP prefixes to the Internet with BGP in order to attract traffic to our network for DDoS protection. Customers can choose to use Magic Transit always on or on demand. With always Continue reading