Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral


Entries for 'Gary Newe'

I remember the days when hacking was something that people did because they could. It wasn’t quite done for fun, but people wanted to show off their computer skills. More often than not, hacking was harmless, someone broke into a system and left a little calling card, but beyond that there was very little damage done. It was for the thrill as much as anything. While I suspect the Hollywood portrayal of hackers being young, socially-awkward men working on their own at a computer in their...
With the recent headlines about vulnerabilities in home broadband routers, http://www.scmagazineuk.com/concerns-over-asus-and-linksys-router-vulnerabilities/article/334710/ and http://www.bbc.co.uk/news/technology-26417441 , I was reminded of something that happened to me.   A True Story   I was spending time with my extended family over Christmas and, as usual, we all had our heads in our phones or “i” devices. Working in IT I generally spend my holidays fixing...
article January 29, 2014 by Gary Newe
Are service providers ready for the new EU roaming regulations? The impending EU roaming regulations are due to come into effect from July 2014, when incoming calls will no longer be charged. Although this is an exciting prospect for consumers, it is potentially troublesome for service providers, particularly as the combined pressures from the EU and demanding subscribers are being compounded as networks shift to IP-based 4G/LTE infrastructure. With the LTE network now relying on new archi...
articleavailabilitysecurityuk February 02, 2012 by Gary Newe
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size...
articleuk September 01, 2011 by Gary Newe
As a descriptive term ‘IT agility’ has, like ‘cloud computing’, ‘virtualisation’ and ‘SOA’, become so widely used that finding a common definition is difficult.  Especially when many people use the term to describe something that they have always done and are simply trying to reframe something so it is more meaningful and up to date. To take two of these: to me, agility and cloud are interchangeable. If you are agile, you can react to change. Unlike an oil tanker you can change course very quic...
With all that has been going on lately you could be mistaken for thinking that the online world was under serious threat, too dangerous to visit and subject to a Foreign Office travel warning. There have been a plethora of headlines reporting data breaches into household name companies or banks. From Sony to Citibank, it seems that no-one was safe. Wave after wave of threat from the latest online group of so-called hackers turned political activists. I say ‘so-called’ because ‘real’ hackers, a...
articlesecurityasmuk May 23, 2011 by Gary Newe
Further thoughts on the 2011 Verizon Data Breach Investigation study.  This year’s report reports a drop of insider related threats. What is interesting is that 92% of attacks stemmed from external agents, and in 2011 11% were from social engineering attacks. There is a decrease in social engineering related attacks, but external attacks in general have risen by 22%. Out of the external attacks, 58% of these were committed by criminal gangs which is further proof indicating, as if more were nee...
Have you seen those status updates in Facebook? "PLEASE put this on your status if you know someone (or are related to someone) who has been EATEN BY PANDAS. Pandas are nearly unstoppable and, in case you didn't know, they can also breathe fire. 93% of people won't copy and paste this, because they have already been eaten by pandas. 6% of people are sitting in their showers armed with fire extinguishers, and the remaining 1% are awesome and will repost." In any system there is a weak link, and...
articlevirtualizationsecurityclouduk April 28, 2011 by Gary Newe
The outage at Amazon ‘surprisingly’ took a lot of large profile sites with it. ‘Surprisingly’ in the sense that it is surprising that these sites didn’t have a back-up plan. Working in IT adds a third certainty to taxes and death: things will fail! That is why we take backups.  That is why we plan for failures, and that is why we never, never rely on a single point of failure. This is why the business continuity (BC) market is expected to be worth more than $39 billion by 2015. So what went wr...
articlesecurityuk April 12, 2011 by Gary Newe
“We are all safe”, I hear journalists cry, “What took them so long?”  First of all, let's examine what HTTPS actually is.HTTPS is basically secure HTTP traffic, using SSL or secure sockets layer. Effectively, what this does is to encrypt communications between two points, these two points being your browser and the server.Now, SSL or HTTPS are no bad thing but it really gets on my wick to hear people proclaim that it makes something secure. Let's be very, very clear about this: it does not make ...
Page 1 of 2First   Previous   [1]  2  Next   Last