Welcome to DevCentral

 

Featured Articles

F5 in AWS Part 1 - AWS Networking Basics

If you work in IT, and you haven’t been living under a rock, then you have likely heard of Amazon Web Services (AWS).  There has been a substantial increase in the maturity and stability...

WhiteBoard Wednesday: All About Profiles

In this edition of WhiteBoard Wednesday, John explores the space of BIG-IP Profiles. What are they? Why do you need them? Do you know? Watch the video and find out for yourself...then, by all means, get out there and start creating some custom profiles!

I trust Certificate Authorities, but I have no idea why

I’ve seen statistics that claim between 40% and 60% of all sites on the Internet use encryption to protect their web application traffic.  Regardless of the true number (which changes on a daily basis), it’s fair to say that encryption is a...

LTM Policy Recipes

LTM Policy is the powerful and performant replacement to the HTTP Class, and first appeared in Big IP 11.4.0.   This is intended to be a short article showing some practical recipes using LTM Policy.  Please also check out another...

Slave Malware Analysis

During the last couple of weeks, Nathan Jester, Elman Reyes, Julia Karpin and Pavel Asinovsky got together to investigate the new “Slave” banking Trojan. According to their research, the early version of the Slave performed IBAN swapping in two...

Recent Articles

Shift (Web App) Security Lefter

The concept of "shifting left" for appropriate IT concerns is growing. The notion is basically to shift more into the app dev delivery pipeline functions that, when applied earlier, can result in greater stability and security of the resulting code. Security is one of those functions that can yield significant benefits in terms of reducing the conflicts and errors that crop up in...

How to Fix That Sewer Smell in your European Hotel Bathroom in 2 seconds

Looking through the reviews on TripAdvisor you would be tempted to think that the boutique hotels in Paris suffered from some kind of horrible sewage problem.   How does a review like that happen? Suppose an American couple checks into a boutique hotel in gay Paris. Everything is fine the first day. Then the second day they start to notice an unwelcome sewer-y odor in bathroom....

DevOps 101 - Integration

In my previous articles on the history of DevOps, I’ve outlined the following pillars of the DevOps methodology Management Integration Communication and information sharing Collaboration Automation Measurement The Second Pillar The second pillar in the DevOps stack is that of Integration.  DevOps integration targets quality testing, feature development, and product delivery. ...

F5 in AWS Part 1 - AWS Networking Basics

If you work in IT, and you haven’t been living under a rock, then you have likely heard of Amazon Web Services (AWS).  There has been a substantial increase in the maturity and stability of the AWS Elastic Compute Cloud (EC2), but you are wondering – can I continue to leverage F5 services in AWS?  In this series of blog posts, we will discuss the how and why of running F5 BIG-IP in...

WhiteBoard Wednesday: All About Profiles

In this edition of WhiteBoard Wednesday, John explores the space of BIG-IP Profiles.  What are they?  Why do you need them?  Do you know?  Watch the video and find out for yourself...then, by all means, get out there and start creating some custom profiles!  

I trust Certificate Authorities, but I have no idea why

I’ve seen statistics that claim between 40% and 60% of all sites on the Internet use encryption to protect their web application traffic.  Regardless of the true number (which changes on a daily basis), it’s fair to say that encryption is a huge issue for sites today, and it’s never a bad idea to understand a little bit more about it.  In order to protect web traffic, sites use the...

How data centre security can uphold online democracy

  Another day, another headline about government hacking of sensitive data. This time it’s allegations that Chinese authorities had hacked the Office of Personnel Management network, accessing information belonging to millions of US federal employees in what has to be seen as an act of cyber espionage. It is thought that the hackers gained access to, “all personnel data for every federal...

Mitigating the favicon bug through LineRate scripting

A recent report (June 2015) revealed a web browser's problem with a large favicon [1]: The browser crashes when the size of a favicon is larger than what it expects. A favicon is a small image, say 16 x 16 pixels, that is displayed next to a browser's address bar or in the bookmark [2]. Because it is downloaded automatically by the browser, users can't have...

Proud to win, Humbled to serve – F5 wins APAC Awards

In recent weeks, the award bells have been ringing for F5 in Asia Pacific. We’ve bagged not one, but four awards, showing a clear testament to our continued market and technological leadership. F5 has always been committed to delivering a holistic customer experience and we are humbled to be accredited by various industry experts and analysts for our work. These awards belong to every F...

ネットワークによりアプリケーションのパフォーマンスを大幅に向上させるための5つのヒント

Please find the English language post, by Lori MacVittie, from which this was adapted here. 本番環境へのアプリケーションの展開は最初のステップにすぎません。優れたユーザ...

Recent Questions and Answers

Kevin Stewart 13835 answered the question Client Connection Issue with SSL Cert
16 minutes ago Read More
Kevin Stewart 13835 answered the question TLS Errors with ApacheDS and LTM
35 minutes ago Read More
Vernon 266 answered the question irule for SIP forward
43 minutes ago Read More
Slumlorde 3 answered the question TLS Errors with ApacheDS and LTM
44 minutes ago Read More
Kevin Stewart 13835 answered the question Client Connection Issue with SSL Cert
53 minutes ago Read More
Kevin Stewart 13835 answered the question TLS Errors with ApacheDS and LTM
2 hours ago Read More
Kevin Stewart 13835 answered the question Destination net unreachable
2 hours ago Read More
Slumlorde 3 answered the question TLS Errors with ApacheDS and LTM
2 hours ago Read More
Jessica 28 answered the question Destination net unreachable
2 hours ago Read More
More Questions »