Archive for 2011/09/21
Microsoft is being investigated over its 99.9 percent uptime claims for its Office 365 service, after a series of outages left users without email and communicationsPosted: 2011/09/21 in Education / Awareness, The Cloud
Why ‘Occupy Wall Street’ makes sense – Banks are sitting on cash hoards and corporate profits are riding high – yet ordinary US taxpayers face joblessness and cutsPosted: 2011/09/21 in Education / Awareness
“Debts between the very wealthy or between governments can always be renegotiated and always have been throughout world history. … It’s when you have debts owed by the poor to the rich that suddenly debts become a sacred obligation, more important than anything else. The idea of renegotiating them becomes unthinkable.”
Although total turnout is lower than hoped, the throng of nearly a thousand protesters refuses to leave, exercising their legal right to assemble on the sidewalks surrounding Wall Street.
You have a lot of kids graduating college, can’t find jobs. That’s what happened in Cairo. That’s what happened in Madrid. You don’t want those kinds of riots here.Posted: 2011/09/21 in Education / Awareness, Public Policy
‘Wall Street protesters doing what most Americans want’
The US government says it supports popular demands and protests in other countries, but it seems like it doesn’t want to see similar scenes at home, does it? Flounders: No, it doesn’t want to see protests at home and it does everything through its media to marginalize and give no coverage or attention and it also tries to distort the message when people are raising demands for their own human rights
Amazon’s Kindle library lending program kicks off, but Kindle format still appears to be swamped by Adobe’s ePubPosted: 2011/09/21 in Education / Awareness, New Business Models
IT lawyer and cybercrime expert Jan-Jaap Oerlemans: giving hackers whistleblower status is a bad ideaPosted: 2011/09/21 in Cybercrime, Education / Awareness, Network Security, Privacy / Data Protection, Public Policy
Gaining access to a computer system without proper authorization is simply not allowed by law and there are no exceptions to that rule. Secondly, it would provide malicious cybercriminals with the perfect alibi at the very the moment they expect to be caught.
Owners of computer systems can always decide to hire hackers to have the security of their systems and sites properly tested before, during and even after they’ve launched those services.
Oerlemans reminds everyone of a famous example when a Dutch magazine wanted to demonstrate the weak security of a Dutch politician’s e-mail service. The magazine hired hackers who needed to infect 14,000 Hyves.nl users in order to be able to compromise their PCs, create a botnet, and then go and launch a brute force attack on the politician’s e-mail account.
Dutch language news article:
Dutch parliament to protect hackers who only want to blow whistle on IT security issues
Dutch language news article:
“The content inspection performance and linear scalability, delivered by Sensory Networks’ HyperScan, is most impressive and much needed in a market where demand for DPI-driven applications such as security, URL filtering and application recognition is growing rapidly”Posted: 2011/09/21 in Education / Awareness, New Business Models, Tech Evolution
The new release of HyperScan supports dual-core to 32-core OCTEON II processors, and when benchmarked with a database of complex regular expressions, targeted at intrusion prevention from a tier-1 equipment vendor, delivered Deep Packet Inspection (DPI) throughput of 3Gbps using just two OCTEON II cores, while also capable of delivering over 40Gbps on a 32-core OCTEON II processor with linear scalability.
Qosmos, a start-up based in Paris, raised EUR 19.8 million (US$28.5 million) for its Deep Packet Inspection (DPI)- based Network Intelligence technologyPosted: 2011/09/21 in Education / Awareness, Network Security, Privacy / Data Protection
Qosmos’ ixEngine provides visibility into data crossing wireless networks by identifying, extracting and querying specific information. The ixEngine offers recognition for hundreds of protocols, and captures thousands of metadata and protocol attributes. The data can then be applied to lawful interception, cyber security, traffic optimization, policy management, service assurance, market research and network and data security. Qosmos’ customers are Network Equipment Providers, Software Vendors and Systems Integrators in the telecom, networking and cybersecurity markets.
How Much Is Netflix’s Traffic Worth? A new dashboard app from Sandvine Inc. tells MSOs not just how much over-the-top video traffic they are carrying but also spells out how much revenue they’re losing to emerging video competitors like Netflix Inc. and Apple Inc.Posted: 2011/09/21 in Education / Awareness, New Business Models, Stats / reports
Sandvine’s Real-Time Entertainment Dashboard uses deep-packet inspection (DPI) to track streaming audio and video traffic from those OTT sources, going as far as quantifying the quality of the video experience and how long customers are viewing those streams.
Tata Communications has revealed its anti-Anonymous DoS protection technology. Involves blackholing and disconnecting peers if necessaryPosted: 2011/09/21 in Cybercrime, Education / Awareness, Network Security, New Business Models, Tech Evolution
Tata Communications, one of a few Tier 1 internet transit providers, told The INQUIRER that its DoS mitigation service can provide “scrubbed” traffic to users, allowing them to withstand onslaughts from the likes of hactivist group Anonymous. Adam Rice, chief security officer at Tata Communications, said that due to the size of Tata’s network, it is able to filter DoS traffic before it gets to the network’s edge and in extreme cases drop traffic from a peer altogether.
Rice said that Tata monitors traffic usage patterns for those customers that take up the option of DoS mitigation. Technically there is no way of preventing a DoS attack – they are designed to look like legitimate requests – so dropping the offending packets is the only way to go.
Rice said that real time deep packet inspection is “not possible for 40Gbit/sec”. If Tata notices abnormal traffic patterns it confirms with the customer that it is not expecting extra traffic due to flash crowds and if not, the traffic the routed to /dev/null, a black hole.
Rice admited that at times this could mean legitimate requests are dropped, though he added, “If there’s a few [legitimate requests] here and there and they have to refresh their browser I would say that’s the same as no impact.” Rice said that Tata runs a “Q&A process after every attack”, allowing it to build up its heuristics in order to drop fewer legitimate packets.
Rice also admitted that if a particular peer has not blackholed DoS traffic originating from its network, Tata has the option of disconnecting that peer from its network. Asked whether a coordinated attack could in theory create ‘internet islands’ by having Tier 1 transit providers disconnect from each other due to DoS traffic, Rice said, “In theory it could happen but is unlikely.”
Tata isn’t the only outfit offering firms the ability to mitigate the effects of DoS attacks but Rice said, “When people sell DDoS [protection] they do it like gym memberships, you buy some capacity and the idea is you oversubscribe that capacity according to a model where you are guessing that not everyone will get DDoSed at exactly the same time. If it is a shared environment then there will be more than enough for any one customer. That model breaks down if the attack reaches a certain size or overwhelms your local infrastructure.” Rice cited the DDoS attack suffered by Sony as one example where this happened.
According to Rice, the reason why such an attack is unlikely to succeed is due to the need for it to be distributed in order to avoid detection. “Duration is the problem,” said Rice, adding that if it was a 20Gbits/s burst for a few seconds, the firm’s core network and those of other Tier 1 networks could be able to cope. Rice pointed out that if the attack was from a single route then it would be easy to blackhole that particular route, but to sustain an aggregate throughput of 20Gbits/sec from multiple sources is extremely difficult.
Rice also claims that Tata has foiled attacks on its customers by Anonymous. He said, “We have customers that have had attacks identified by groups like Anonymous and we’ve stopped it all. The big DDoS threat has been the underground – the extortion and the politically motivated DDoS attacks and that has been going on since the early 2000s.”
As hactivist groups use DoS more often as a means of bringing companies to their knees, inadvertently they are helping the transit providers protect their customers against the effects of crippling attacks. Perhaps some credit should be given to Anonymous and groups like it for creating increasingly more robust DoSprotection in the core internet infrastructure.
Tier-1 mobile operator customer, the largest in a South Pacific nation, has chosen Procera’s PacketLogic solutions to be the core of its new satellite bandwidth service to a new national wholesale-only, open access high-speed broadband networkPosted: 2011/09/21 in Education / Awareness, New Business Models, Tech Evolution
“Procera’s PacketLogic solution performs at full load according to specifications and delivers real-time visibility down to hub, ISP, host, user and protocol, making troubleshooting extremely easy”
The PacketLogic family of intelligent policy enforcement solutions offers network operators the true real-time visibility needed to actively monitor their network 24×7 and ensure a maximum quality of experience for their subscribers. With a combined hardware and software solution that scales under real network conditions and avoids the congestion points experienced by competing solutions, Procera has provided this customer with a complex rule set to handle service plans for both their ISPs and end customers.
Procera Awarded $6 Million Follow-on Order from North American Cable MSO – Procera will report on video usage, popularity of applications and the overall experience of customersPosted: 2011/09/21 in Education / Awareness, New Business Models, Tech Evolution
Procera will report on video usage, popularity of applications and the overall experience of customers.
“MSOs need to understand what type of traffic and applications are driving network usage. They require reliable and detailed analytics that they can use to formulate new service plans and target demographics,” said Cam Cullen, vice president of global marketing at Procera, in a release.
Business intelligence is a key for operators to modify their service and stay one step ahead of competitors in this cutthroat market.
Under the deal, Procera will also help the MSO improvise customer portals in order to develop an interactive relationship with customers.
“Our intelligent policy enforcement solutions enable operators to charge according to services, not just consumption, and to create innovative new services that are personalized according to what subscribers want,” said Cullen.
WIPO releases recent IP statistics – IP Facts and Figures 2011 shows that trademark protection is the most sought-after form of IP, especially in ChinaPosted: 2011/09/21 in Education / Awareness, Stats / reports
Newzbin2 operators now say they are prepared to adapt their client to help other blocked sites stay onlinePosted: 2011/09/21 in Blocking, Education / Awareness, New Business Models, Tech Evolution
Is Google evil? That’s essentially what the United States Senate — not exactly the best arbiters of good and evil, you gotta admit! — is going to be trying to figure out over the next few daysPosted: 2011/09/21 in Education / Awareness, Google, Public Policy
For reference, this study is based on the responses of 1,400 college students between the ages of 18 and 23 and another 1,400 young professionals under 30 years old. It was conducted and translated into the local languages in the following 14 countries: the United States, United Kingdom, France, Germany, Italy, Spain, Russia, Japan, China, India, Australia, Mexico, Brazil and Canada.
Cybercriminals have been trying hard to infect millions of computers worldwide since 8th August. The purpose of this vast computing force is still not clearPosted: 2011/09/21 in Cybercrime, Education / Awareness, Network Security, Privacy / Data Protection, Stats / reports
My first Peace March was when I was 10, in Kingston, and even though I was young at this event I didn’t wear a leash. It was when I was 11 , at the Peace March in Washington D.C., that I was tormented with this device that is supposed to keep dogs behaved, not little girls.
Thankfully at the next event, protesting the U.S. occupation in Iraq, there was no leash, but my mother did keep an eye on me in case I ventured off into the crowd.
When I asked my mom whether I could go down to Manhattan and blog about the Wall Street Occupation, she joked and got out the leash, saying, “But I wont be able to protect you.”
Roseanne Barr has addressed demonstrators in New York, declaring her support for Occupy Wall Street and confirming that she is really running for president.
Full List Of Sites The US Air Force Blocked To Hide From Wikileaks Info; Includes NY Times & The GuardianPosted: 2011/09/21 in Blocking, Education / Awareness, Public Policy
Just ahead of its grilling in front of the Senate in Washington, Google has set up a blog page answering some of the anti-competition allegations against itPosted: 2011/09/21 in Education / Awareness, Google, Public Policy
The government seized and shut down Puerto 80 and its users’ means of communication in an ex parte procedure with no notice to Puerto 80 and no adversary hearing of any kind. It held those domain names for more than six months before any court ever considered whether the seizure violated the First Amendment or caused Puerto 80 substantial hardship such that the domain names should be released pending a determination of the merits of the forfeiture case. To date, no court has reached the merits of the government’s casePosted: 2011/09/21 in Blocking, Education / Awareness, Illegal File Sharing, Public Policy
When the district court did rule, it dismissed the First Amendment concerns in a paragraph, improperly placing the burden on Puerto 80 to show that it suffered substantial hardship from the government’s prior restraint. And the government did all this without ever having had to prove to any court that Puerto 80 (or anyone else) was guilty of copyright infringement. Indeed, to this day the government takes the position that it will never have to justify its seizure by showing that Puerto 80 violated any law