Welcome to DevCentral

 

Featured Articles

F5 in AWS Part 1 - AWS Networking Basics

If you work in IT, and you haven’t been living under a rock, then you have likely heard of Amazon Web Services (AWS).  There has been a substantial increase in the maturity and stability...

WhiteBoard Wednesday: All About Profiles

In this edition of WhiteBoard Wednesday, John explores the space of BIG-IP Profiles. What are they? Why do you need them? Do you know? Watch the video and find out for yourself...then, by all means, get out there and start creating some custom profiles!

I trust Certificate Authorities, but I have no idea why

I’ve seen statistics that claim between 40% and 60% of all sites on the Internet use encryption to protect their web application traffic.  Regardless of the true number (which changes on a daily basis), it’s fair to say that encryption is a...

LTM Policy Recipes

LTM Policy is the powerful and performant replacement to the HTTP Class, and first appeared in Big IP 11.4.0.   This is intended to be a short article showing some practical recipes using LTM Policy.  Please also check out another...

Slave Malware Analysis

During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two...

Recent Articles

榮耀得獎 謙卑服務 - F5榮獲多項亞太獎賞

This blog post is adapted from the original post in English here.  最近,F5在亞太屢獲獎賞。四項大獎的獲得,明確證明了F5持續的市場與技術領導性。F5一直致力於提供全方位的客戶經驗,並且很榮幸的獲得許多業界專家與分析師對於我們的肯定。這些獎賞屬於亞太區每一位F5員工的榮耀。F5全心支持我們的夥伴成長,並且為客戶提供方案與服務,這些努力讓F5從平凡的廠商茁壯成為一個在企業混合環境為數千應用提供優化與安全的可信賴夥伴。 F5今年從Frost & Sullivan獲得象徵應用交付控制器(Application Delivery Controllers; ADC)領導地位的大獎。這對於F5是一項非常特別的榮譽,因為這是我們第七年獲得Frost &...

The Usefulness of the GUI and the Utility of the Script

I’m excited to be heading to New York this week for the AWS Summit, and not just for the chance to discover strange new life forms.  It’s a a well timed event as we are doing a lot of work in with public cloud services,  and I’m looking forward to getting some feedback from people using F5 in AWS. As preparation, I’m running through a crash course in Python and Ansible  to better...

Shift (Web App) Security Lefter

The concept of "shifting left" for appropriate IT concerns is growing. The notion is basically to shift more into the app dev delivery pipeline functions that, when applied earlier, can result in greater stability and security of the resulting code. Security is one of those functions that can yield significant benefits in terms of reducing the conflicts and errors that crop up in...

How to Fix That Sewer Smell in your European Hotel Bathroom in 2 seconds

Looking through the reviews on TripAdvisor you would be tempted to think that the boutique hotels in Paris suffered from some kind of horrible sewage problem.   How does a review like that happen? Suppose an American couple checks into a boutique hotel in gay Paris. Everything is fine the first day. Then the second day they start to notice an unwelcome sewer-y odor in bathroom....

DevOps 101 - Integration

In my previous articles on the history of DevOps, I’ve outlined the following pillars of the DevOps methodology Management Integration Communication and information sharing Collaboration Automation Measurement The Second Pillar The second pillar in the DevOps stack is that of Integration.  DevOps integration targets quality testing, feature development, and product delivery. ...

F5 in AWS Part 1 - AWS Networking Basics

If you work in IT, and you haven’t been living under a rock, then you have likely heard of Amazon Web Services (AWS).  There has been a substantial increase in the maturity and stability of the AWS Elastic Compute Cloud (EC2), but you are wondering – can I continue to leverage F5 services in AWS?  In this series of blog posts, we will discuss the how and why of running F5 BIG-IP in...

WhiteBoard Wednesday: All About Profiles

In this edition of WhiteBoard Wednesday, John explores the space of BIG-IP Profiles.  What are they?  Why do you need them?  Do you know?  Watch the video and find out for yourself...then, by all means, get out there and start creating some custom profiles!  

I trust Certificate Authorities, but I have no idea why

I’ve seen statistics that claim between 40% and 60% of all sites on the Internet use encryption to protect their web application traffic.  Regardless of the true number (which changes on a daily basis), it’s fair to say that encryption is a huge issue for sites today, and it’s never a bad idea to understand a little bit more about it.  In order to protect web traffic, sites use the...

How data centre security can uphold online democracy

  Another day, another headline about government hacking of sensitive data. This time it’s allegations that Chinese authorities had hacked the Office of Personnel Management network, accessing information belonging to millions of US federal employees in what has to be seen as an act of cyber espionage. It is thought that the hackers gained access to, “all personnel data for every federal...

Mitigating the favicon bug through LineRate scripting

A recent report (June 2015) revealed a web browser's problem with a large favicon [1]: The browser crashes when the size of a favicon is larger than what it expects. A favicon is a small image, say 16 x 16 pixels, that is displayed next to a browser's address bar or in the bookmark [2]. Because it is downloaded automatically by the browser, users can't have...