Forgot your password?
typodupeerror

Comment: last mile access (Score 1) 135

by jaredmauch (#46867007) Attached to: Netflix Confirms Deal For Access To Verizon's Network

Now is the time if you care to have everyone you know stand-up for *decreased* regulation in the last mile and locally, not more. The cost of building high speed access to your location is not in the long-haul but the local access network. Long-haul costs are at their lowest point ever, but getting to the major locations is always the expensive part. Labor costs, including engineering and permits make the cost of installing fiber or other technology insignificant.

Comment: Re:SubjectsInCommentsAreStupid (Score 1) 285

by jaredmauch (#45324047) Attached to: Ask Slashdot: Simple Backups To a Neighbor?

Fiber and media converters are suitably cheap. You can get the TP-LINK MC220-L for around $20-30, and the optic for as low as $35 depending on your source and type/distance. This works well as you don't have to worry about shielded cabling if you ran something like cat5/6. You can also reach much further distances than with copper wire. You don't necessarily need permits, but you do need to call MISS-DIG, or whatever the local version of that is. When the guy comes out, tell him exactly what you are planning on doing, route, possible routes, etc. Most places require a hand dig within a few feet of any marked utility. The rest you can use a rented trencher to do. Running conduit will make a lot of sense, you typically need schedule-80 which you won't find at lowes/home depot. You can also call a contractor to do this work, depending on the distance it may only cost a few thousand dollars at most. If your goal is to keep things super-low cost, then wifi or other networking may be your ideal solution. Look at the hardware from ubnt.com and see what works. If you don't have line of sight, you will need to run a cable to make this work. If cost doesn't come into the equation, you can also get SFP+ PCIe cards and do this at 10Gb/s vs 1Gb/s much easier. Make sure you run single model fiber, otherwise you may have troubles if you encounter older OM1/OM2 and try to launch 10G signals.

Hope it works out!

Comment: Properly configured hosts not impacted (Score 5, Informative) 179

by jaredmauch (#42046843) Attached to: NTP Glitch Reverts Clocks Back To 2000

If you saw this problem, your NTP time sources were not properly configured and diverse.

Consider using the NTP pool and not relying on so few sources to properly sync your time. Read 5.3.3 and 5.3.4 from http://support.ntp.org/bin/view/Support/SelectingOffsiteNTPServers for help to correct your NTP setup.

Comment: Re:do *not* Get a tunnel. (Score 1) 312

by jaredmauch (#35087124) Attached to: Last Available IPv4 Blocks Allocated

You're talking about small routers. I'm talking about stuff like t1600 where everything is done entirely in hardware. If you look at the QFP in the ASR1k (cisco) you will see where it can do the nat, etc in hardware. that's more sensible than a lot of the devices where things are just pure slow-path (ie: punted to cpu for the fib lookup based on the various ribs your device may have).

We're talking about entirely different classes [and engineered uses] of equipment, and that's obvious to me. Hope you understand that as well.

Comment: Re:do *not* Get a tunnel. (Score 1) 312

by jaredmauch (#35078746) Attached to: Last Available IPv4 Blocks Allocated

You are talking about a Firewall device that performs NAT, (and appears as a "router" on the lan. Most of what you see at the store/online is not a "real" router IMHO. Then again, I'm biased as I deal with n*10G all day in a large network. When people call those devices at their home a 'modem' or 'router' i generally wince. I think of them more along the lines of a media converter (dsl, cable to rj45/802.3)

Comment: do *not* Get a tunnel. (Score 1) 312

by jaredmauch (#35068128) Attached to: Last Available IPv4 Blocks Allocated

Real routers don't have 'state tables'.

Ask your ISP for IPv6 access. Enable your web server/site for IPv6 day. Use a 'web bug' tracker item to identify broken thins.

visit places like http://test-ipv6.com/ to try to understand how ready you are.

Make sure if you have a tunnel, or use one, you do not add too much latency to your connection. The CDNs won't send your traffic over IPv6 if your IPv6 goes to some other continent or geographical region.

Comment: Re:DDOS = Digital Sit-in (Score 1) 206

by jaredmauch (#34534312) Attached to: Has Progress Been Made In Fighting DDoS Attacks?

Not really. If you are blocking the public right of way, you can be arrested. Most stores are on private property, not public so they can reserve the right to refuse service to you as well.

This is why those involved in sit-ins have been arrested in the past, and those on-strike have to 'keep moving' and can't just do their own sit-in.

Comment: Re:Staff shortages (Score 1) 156

by jaredmauch (#33752624) Attached to: Cyber Command Will Miss Friday's Operational Deadline

There's a lot of places to go with this, including over classifying data, etc.. that typically happens, and getting it revisited with the right class authority. You have to look no further than the SBU reports that come out from GAO. It makes it really tough, combined with existing regulations set in stone by congress.

Comment: Re:Staff shortages (Score 1) 156

by jaredmauch (#33752552) Attached to: Cyber Command Will Miss Friday's Operational Deadline

A lot of these jobs require that you be a US Citizen in order to pass the background check to be granted a security clearance. There are lots of jobs posted at clearancejobs.com and other sites that reflect this need. It may take 6-9 months for that process to complete itself (or up to ~2 years in some cases) but once that gauntlet has been run, it becomes much easier the next time.

If you're a qualified networking or IT geek that meets those criteria, there are plenty of jobs available.

http://www.usajobs.opm.gov/ may also be of value to you as well.

Some of these jobs are serious cash $119k+ ($10k/mo)

Google

+ - Apps Nuked By Google Were Botnet Proof-Of-Concept->

Submitted by AGreenberg
AGreenberg (1842126) writes "I've written a post at Forbes' cybersecurity blog explaining something that's been missed in coverage of Google's decision to exercise its "kill switch" and delete two apps from Android phones. The apps were not "practically useless" as Google has described them. They were created by cybersecurity researcher Jon Oberheide as a proof-of-concept to show the possibility that a misleading application could transform into malware. One was a fake Twilight preview application capable of fetching new executable code, and was downloaded by more than 300 users. Google only became aware of the apps and deleted them after Oberheide presented his research at the Summercon security conference last week."
Link to Original Source

There's got to be more to life than compile-and-go.

Working...