I’ve been thinking about the security issues of working with Huawei equipment and Huawei the company. I’ve spoken with a number of people who, off the record, talk of working with Huawei as customers and their experiences of the product have been less than excellent but the price is low. What I’ve realised is concerning. [...]
Vendors are rarely believable when data sheets state the performance of IPS systems. That’s partly the fact that IPS performance is variable according to types of inspection rules that are configured and the amount of traffic hitting those rules, in use. In short, IPS performance is determined by the complexity of the rules you choose to [...]
Another sign that it’s time to stop buying service modules for Catalyst 6500. This is not the time for dedicated hardware appliances such as ACE or ASA Service Modules. Mulitcontext support for routing and VPN is not available on C6500 ASA Service Module. Multi-Context Enhancements Enhances the current ASA Multicontext capability to include support for [...]
Lots in insight for Enterprise people to consider when defending your network against DDoS attacks. At CloudFlare, an attack needs to get over about 5Gbps to set off alarms with our ops team. Even then, our automated network defenses usually stop attacks without the need of any manual intervention. When an attack gets up in [...]
You can deploy some modern firewalls in Layer 2 mode such that they are transpart
Once upon a time, ZoneAlarm was the best personal firewall available. It was free, stable and excellent. I seem to remember using it from 2002-2003 or so – then Zonealarm was acquired by CheckPoint and the product was lost to the retail market. CheckPoint moved the product to corporate desktops and was lost to the [...]
Apple is disabling Java by default in the last update which is a perfect solution to the risk that Java presents to the desktop. At the same time, it’s drives a stake into the heart of Java.
I’m deleting social media accounts with a sense of fear. Who wants to share _everything_ ? I did, until I realised how dangerous Network Theory is for exposing information about you. And everyone you know.
Microsoft announces zero-day exploitable RDP flaw that gets full compromise of server. Expects worm to be available within thirty days. I get to gloat and say “I told you so” to all Microsoft admins everywhere.