Your IP is:

3.14.132.43

[More Detail]


Instant Port Checker

IP:[get my ip] Port1:[EL2/PR2/PM3]   [XON NVR] Port2: Port3:

Skip to content

IPv6 To Complicate Threat-Intelligence Landscape


A common type of Internet-based threat intelligence is the assigning of reputation scores to the source of traffic, usually expressed as a certain Internet address or domain.

Yet, with the gradual–some would say “glacial”–move to the Internet Protocol Version 6 (IPv6) address scheme, the Internet’s address space will grow from merely big to nearly infinite. The vastness of the address space will cause problems for many threat-intelligence firms, from allowing attackers to use a new address for every attack to causing a rapid expansion in the size of the database needed to track the data on various sources, says Tommy Stiansen, chief technology officer for Norse, a real-time threat intelligence provider.

Categories: General.

Tags: , , ,

The IT Generation Gap

VMworld panel exposes a rift between innovative startups focused on cloud, mobile and social technologies and old IT that clings to its data centers and self-managed applications.
Network Computing

Categories: General.

Tags:

WLAN Success During Back-to-School Deluge

My team onboarded 10,000 wireless devices as students arrived for the start of the fall semester. Here’s how we made it a (mostly) painless experience.
Network Computing

Categories: General.

Tags: , , , ,

Should your next PC be a Surface Pro?

Microsoft revealed that it’s limited-time $ 100 discount on Surface Pro pricing isn’t so limited after all. The discount is now permanent, and Microsoft cut the cost of the Touch keyboard cover as well. The reduced pricing makes the Surface Pro more attractive, but it’s still not enough to significantly sway sales.

Categories: General.

Tags: , ,

Should Applications Listen To The Network?

One goal of SDN is to make the network more responsive to application needs. But applications also have to be responsive to the state of the network.
Network Computing

Categories: General.

Tags: , , ,

Dell Switch Supports VMware NSX

S6000 connects physical and virtual infrastructures; Citrix NetScaler works with NSX; Gigamon adds multi-tenant traffic visibility; Check Point updates software blade architecture.
Network Computing

Categories: General.

Tags: , , ,

Lessons Learned From N.Y. Times Hack Attack


What might The New York Times — and to a lesser extent, Twitter — have done differently to prevent Tuesday’s hack attack that disrupted access to their sites?

The disruptions began after the Syrian Electronic Army (SEA), a group of hackers that back Syrian President Bashar al-Assad in the country’s civil war, hacked into the systems of the world’s sixth largest domain name system (DNS) registrar, Melbourne IT, and altered DNS settings for nine sites.

Categories: General.

Tags: , , , , , ,

Is Microsoft Ready To Be A Storage Player?


Would you expect Microsoft to offer enterprise-class storage? It sounds a bit silly given that a) Microsoft isn’t a storage vendor and b) the storage industry behemoths offer plenty of innovative products. But the fact is Windows Server 2012 includes quite a repertoire of storage features, from deduplication to thin provisioning, including the product I’m focusing on here: Storage Spaces.

Categories: General.

Tags: , , ,

Twitter Spike Highlights Need To Plan For Traffic Surges

Social media site withstands Miyazaki record-shattering event but other websites have crumbled under traffic spikes, underscoring the need for better preparation.
Network Computing

Categories: General.

Tags: , , , , , ,

Cisco Skips VMware’s NSX Coming-Out Party

Networking giant Cisco Systems was noticeably absent in the list of partners VMware says are working on NSX integrations.
Network Computing

Categories: General.

Tags: , , , ,