Showing posts from May, 2019

Cisco security spotlights Microsoft Office 365 e-mail phishing increase

Cisco blog follows DHS Cybersecurity and Infrastructure Security Agency (CISA) report detailing risks around Office 365 and other cloud services
Read the article over at Network World over here

LucidView’s whitelabel Internet content filter and reporting solution for IT Service Providers

Powerful Content Filtering and Internet usage reporting solution is now available to IT Service Providers as a 100% whitelabel product.  This allows these IT Service Providers to offer a completely self-branded Content Filter and Internet Usage Reporting service to their customers.
Find out more about the product over at MyBB over here

Disable WPAD now or have your accounts and private data compromised

Researchers show the WPAD protocol can be used to steal user data despite HTTPS or VPN connections
Read the article over at PC World over here

122 Great Reasons to Buy an HMT-1 Today (Off the Top of Our Head)

Here are 122 Incredible Reasons to Make the Switch to Hands-Free Computing with RealWearOK, so you’re super impressed after downloading our data sheet.  Maybe you’ve downloaded our white paper on using intrinsically safe hands-free wearable computers in restricted hazardous zones, and are wondering if you should make the leap and free your hands for work. We’ve compiled 122 incredible reasons to buy your first hands-free HMT-1 head-mounted rugged wearable computer today for your work.  (Of course, we built this list off the top of our head.)
Read the blog post over at realwear over here.

Looking Glass

Easy to deploy Looking Glass made in PHP.
RequirementsWebserver such as Apache 2, or Lighttpd, etc…PHP (>= 7.0) module for the webserver (libapache2-mod-php for Apache 2 for example)The XML package is required as well (php7.0-xml on Debian for example)Description This web application made in PHP is what we call a Looking Glass. This is a tool used to get some information about networks by giving the opportunity to execute some commands on routers. The output is sent back to the user.
For now this looking glass is quite simple. Here you have some features:
Interface using Javascript and AJAX calls (needs a decent browser)Support the following router types: JuniperBIRDCisco (IOS and IOS-XR)Extreme/Brocade NetIronMikrotik/RouterOSOpenBGPdQuaggaVyatta/VyOS/EdgeOSFRRoutingSupport of Telnet and SSH connection to routers using password authentication and SSH keysConfigurable list of routersTweakable interface (title, logo, footer, elements order)Log all commands in a fileCustomizable outp…

Mylg - A Command Line Network Monitoring Tool for Linux Systems

In this article we will show how to install and use the network monitoring software called My Looking Glass, or mylg. It is fairly early in mylg development but it already supports lots of great features like for example packet analyzer, web dashboard, port scanning and many more. We will install it on Ubuntu 16.04 LTS. What mylg can diagnose in network1) Real time trace route (support IPv4 and IPv6 networks)2) Dig command enhanced3) TCP/IP packet analyzer4) Enhanced HTTP Ping and Dump5) Port scanning commands6) Peer information7) Network LAN Discovery8) Collect ASN, IP/CIDR information9) DNS lookup information

The 10 most powerful companies in enterprise networking

Here's our rundown of what makes these 10 network-gear vendors the biggest power players within the enterprise.
Read the article over at Network World over here

Why I Can’t Recommend PfSense To Fix Bufferbloat For Gamers

Bufferbloat, or the massive sudden ping spikes it causes in online games, is one of the biggest issues that gamers face.

Pi-hole: Network-wide ad blocking via your own Linux hardware

The Pi-hole® is a DNS sinkhole that protects your devices from unwanted content, without installing any client-side software. Easy-to-install: our versatile installer walks you through the process, and takes less than ten minutesResolute: content is blocked in non-browser locations, such as ad-laden mobile apps and smart TVsResponsive: seamlessly speeds up the feel of everyday browsing by caching DNS queriesLightweight: runs smoothly with minimal hardware and software requirementsRobust: a command line interface that is quality assured for interoperabilityInsightful: a beautiful responsive Web Interface dashboard to view and control your Pi-holeVersatile: can optionally function as a DHCP server, ensuring all your devices are protected automaticallyScalable: capable of handling hundreds of millions of queries when installed on server-grade hardwareModern: blocks ads over both IPv4 and IPv6Free: open source software which helps ensure you are the sole person in control of your privacy 

Beginner’s Guide to Bufferbloat? How to fix lag on your network

Do you ever feel like something in your home is slowing down your home network? Whether you’re waiting for Netflix to stop buffering, waiting for your Facetime call to unfreeze, or waiting for your online game to stop lagging, we all spend too much time struggling with our connection.  This problem happens when other devices eat up your bandwidth. The technical term for this is ‘Bufferbloat’ and this beginner’s guide will explain how it happens and what you can do to fix it. 
Read the article over at Netduma over here.

Network Troubleshooting Guidelines

It all started with an interesting weird MLAG bugs discussion during our last Building Next-Generation Data Center online course. The discussion almost devolved into “when in doubt reload” yammering when Mark Horsfield stepped in saying “while that may be true, make sure to check and collect these things before reloading”.  I loved what he wrote so much that I asked him to turn it into a blog post… and he made it even better by expanding it into generic network troubleshooting guidelines. Enjoy!
Read the blog post over at IP Space over here.

Dealing with Performance Brownouts

I’ve done a couple of application slowness (brownout) troubleshooting sessions recently. This blog is my attempt to condense some observations from both engagements, to share lessons learned. “Condense” might not be the right word, seeing how long this blog got! Troubleshooting with some process awareness can help! I have a troubleshooting process. Sometimes I do all the aspects, sometimes I do the short version. I think it helps! As I was drafting this blog, posted a very comprehensive blog on the same topic. Recommended! Darn, Ivan beat me to print again! 
Read the blog post over at Netcraftsman over here.

Shackleton's whisky

The story of Shackleton's whisky.

History Of Networking – Cisco CLI – Terry Slattery and Rob Widmer

Terry Slattery and Rob Widmer played a significant role in the creation of the Cisco CLI, which has been the industry standard for networking CLIs ever since. In this History of Networking episode we talk to Terry and Rob about the history of how the Cisco CLI came to be and get the story on how the decisions were made that made the CLI what it is today.
Listen to the podcast over at Network Collective over here.

Tom's Top Ten Things Executives Should Know About Software

A friend of mine is an accountant at a large company. The CEO and other executives don't know what accounting is, and that's OK. Everyone works around it.  OK, that's a lie. No company like that exists.  I do have a friend, however, who is a software engineer at a large company where the CEO and other executives don't understand software. They don't understand what is reasonable to expect software to do, how it is made, how software projects are managed, or how a web-based service is run.  That isn't something that employees can "work around."  Maybe that was OK years ago, but it isn't OK now. In fact, my advice to this friend was to start sending out her resume. Many companies that don't think of themselves as software companies are finding that software is a key component of their operations. If executives and management do not understand how software is made, they will be ineffective compared with those who do. This will either l…

What can L2TP do for your network?

The Layer 2 Tunneling Protocol (L2TP) is a standard protocol for tunneling L2 traffic over an IP network. Its ability to carry almost any L2 data format over IP or other L3 networks makes it particularly useful. But L2TP remains little-known outside of certain niches, perhaps because early versions of the specification were limited to carrying PPP -- a limitation that is now removed. It is desirable to tunnel L2 traffic over routed L3 networks because L2 networks are generally more transparent, easier to configure and easier to manage than L3 networks. These are desirable properties for a range of applications. In data centers, a flat network is essential for promoting virtual machine (VM) mobility between physical hosts. In companies with multiple premises, the sharing of infrastructure and resources between remote offices can be simplified by L2 tunneling. The L2TP protocol itself is an open standard defined by the IETF. This article concentrates on the latest Version …

Internet Power Unit

Specifications Dimensions:
220mmx190mmx80mm (H x W x D)
Cold Start 15A/115V AC, 30A/230V ACOverload Protection 115% ‐ 135% of the rated power, pulsing hiccup shut down, auto recoveryOvervoltage protectionShort circuit protection, recoveryLow power consumption, high reliability100% full load burn‐in testAudible tone for mains failBattery protection circuit built inBattery charger is intelligent - switch mode charging processed by a PIC processorPower Rating:
Output: 12V 3.5A
12V 7AH Battery used as standard
Standard Cables:
The IPU comes standard with 2 x 1.5m cables with industry standard 2.1mm moulded plugs
The unit will dissipate a small amount of heat so please ensure that the unit is installed in a place where there is sufficient ventilationThis unit must not be installed outside as it is not protected against waterMounting, maintenance and repair must be carried out by a skilled and authorised personWarranty:
This product carries a one year warranty and is…