Telecom and Networking

Microsoft has released a Debian Linux switch OS. Repeat, a Debian Linux switch operating system • The Register

Microsoft has today released the source code to an open-source operating system, based on Debian GNU/Linux, that runs on network switches. The software is dubbed SONiC, aka Software for Open Networking in the Cloud. It’s a toolkit of code and kernel patches to bend switch hardware to your will. http://www.theregister.co.uk/2016/03/09/microsoft_sonic_debian/ Posted from WordPress for Android

5G Coming Sooner, Not Later – IEEE Spectrum

Things are moving at blistering speed in the world of next-generation 5G mobile communications—even though many mobile users have still or only recently upgraded to 4G LTE communications, and even while 4G continues to evolve. Nevertheless, four of the telecom industry’s big hitters—Japan’s NTT Docomo, South Korea’s KT and SK Telecom, and Verizon in the

Finnish startup Zyptonite brings privacy to video calls

“Zyptonite is the first real-time communications app that connects parties directly,” says Antti Uusiheimala, Co-Founder and CEO of Zyptonite. “People need a simple, reliable and free video call and messenger service that works on different devices and operating systems without problems.” The startup cut out the server and built its service on peer-to-peer (P2P) technology,

How Do I Drop or Block Attackers IP Address With Null Routes On a Linux?

Someone might attack your Linux based system. You can drop attacker IP using IPtables. However, you can use the route or ip command to null route unwanted traffic. A null route (also called as blackhole route) is a network route or kernel routing table entry that goes nowhere. http://www.cyberciti.biz/tips/how-do-i-drop-or-block-attackers-ip-with-null-routes.html Posted from WordPress for Android

Internet of Exploits (IoE)

I recommend that we start using new term I heard at Disobey.fi event: Internet of Exploits (IoE) is to be used to describe the current and future situation of network being filled exploitable Internet of Things (IoT) and other poorly secured networked devices. We were sold the idea of Internet of Everything (IoE) and what