Worth Reading: Crafted DDoS

31 July 2017

We’d like to introduce you to one of the most devastating ways to cause service instability in modern micro-service architectures: application DDoS. A specially crafted application DDoS attack can cause cascading system failures often for a fraction of the resources needed to conduct a more traditional DDoS attack. This is due to the complex, interconnected…

Worth Reading: IPv4 route lookup on Linux

28 July 2017

During the lifetime of an IPv4 datagram inside the Linux kernel, one important step is the route lookup for the destination address through the fib_lookup() function. From essential information about the datagram (source and destination IP addresses, interfaces, firewall mark, …), this function should quickly provide a decision. —Vincent Bernat @MTU Ninja

Worth Reading: DNS Hijacking is Real

28 July 2017

Over the years hackers have hijacked many domain names by manipulating their DNS records to redirect visitors to malicious servers. While there’s no perfect solution to prevent such security breaches, there are actions that domain owners can take to limit the impact of these attacks on their Web services and users. —Lucisn Constantin @ The…

Worth Reading: IPv6 flags and DNS configuration

27 July 2017

One of the several capabilities provided by IPv6 is that hosts are provided two options to configure their IPv6 addressles) and other parameters like the Recursive DNS Server(RDNSS) information [2]; that is either by using the stateless address autoconfiguration [3] or by obtaining the information from aDHCPv6server(4]. IPv6 hosts are advised as for the environment…

Worth Reading: Cisco’s Viptella Challenge

27 July 2017

When Cisco announced its intent to acquire leading SD-WAN vendor Viptela in May of 2017, the network industry buzzed with conversation. Now, we’re in the quiet purgatory while we wait for regulatory approval. Since the deal hasn’t been finalized yet, neither company can say much about their plans for integration. But it’s clear that a…

Worth Reading: Internet Resource Course

26 July 2017

Following the success of the first course ‘Introduction to Cybersecurity’, the APNIC Academy has launched its second course: ‘Internet Resource Management’. The course is for anyone interested in managing their Internet number resources more effectively, familiarising themselves with the Internet ecosystem, and finding out new ways to engage with the Internet community. —APNIC

Worth Reading: The Great Ethereum HAck

26 July 2017

Around 12:00 PST, an unknown attacker exploited a critical flaw in the Parity multi-signature wallet on the Ethereum network, draining three massive wallets of over $31,000,000 worth of Ether in a matter of minutes. Given a couple more hours, the hacker could’ve made off with over $180,000,000 from vulnerable wallets. —Haseeb Qureshi @ Free Code…

Worth Reading: Docker Part 0

25 July 2017

Containers (and microservices) are the future of application delivery, at least until the next Great Tech Leap Forward comes along, and Docker is the category killer platform. Companies are adopting Docker at a remarkable rate these days. And, increasingly, all developers — and systems administrators, and cloud administrators — need to at least have a…

Worth Reading: Pursue Meaning

25 July 2017

A recent article in The Washington Post identified a rising “sea of despair” among the white working class and a surge in suicides from 1999 to 2015, when a record high of 600,000 Americans took their own lives. In a country as free and as prosperous as the United States of America, where the pursuit…

Worth Reading: The future is hardware

24 July 2017

Since the advent of open source in telecoms, customers have increasingly fallen in love with the idea of getting all software for free. That keeps vendors scratching their heads when thinking about long term survival, let alone midterm profitability… and ways of differentiating. Hopefully the industry will find a way to keep on paying for…