Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

What is DNS?

What is the Domain Name System (DNS)? Imagine how difficult it would be to use the Internet if you had to remember dozens of number combinations to do anything. The Domain Name System (DNS) was created in 1983 to enable humans to easily identif... Read more
1 Review

Lightboard Lessons: DNS Scalability & Security

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all... Read more
Average Rating: 4.9
3 Reviews

Lightboard Lessons: Pinhole DNS

A couple years ago when I was managing the infrastructure for our test, stage, and production DevCentral environments, we had to test from mobile devices to the internal test/stage environments, but on devices like iPads and iPhones, you can’t... Read more
1 Review

The Dangerous Game of DNS

The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all... Read more
2 Reviews

2016: Everything connects to something: Make sure it’s the right thing with a smarter DNS infrastructure.

Despite my views on IT predictions I do feel honor bound to read the various predictions out there.  Wearables, virtual reality, machine learning, artificial intelligence, autonomous transport, lightsabers (ok, the last one is actually... Read more
0 Reviews

A Catch from the Codeshare: DNS Response Translation

On the side of the road in northern Missouri just north of Mark Twain’s stomping grounds, there is a slice of hillside removed just to the side of the highway. In Arkansas, there’s a nondescript field tucked away in a state park. Short... Read more
0 Reviews

Is Your DNS Vulnerable?

A recent report from The Infoblox DNS Threat Index (in conjunction with Internet Identity) shows that phishing attacks has raised the DNS threat level to a record high of 133 for second quarter of 2015, up 58% from the same time last year. The... Read more
0 Reviews

F5 Friday: The Power of Programmability Goes Beyond Load Balancing

Most of the time when we think about (and honestly, talk about) “programmability” of app services (in the network) we end up illustrating its potential by using load balancing or perhaps app security.  That’s because the possibilities seem... Read more
0 Reviews

IT安全性不能以一種方案「一體適用」

This is adapated from the original post by Matt Miller. 今天的安全局勢具有高度複雜化的傾向,原因大致上可以歸咎於日益複雜化的網路攻擊本質,特別是從管理者的觀點來看。例如,分散式拒絕服務攻擊(DDoS)現在已達到400Gbps速度,目標包括網路和應用層。很顯然的,攻擊者持續進化,開發其他方法來繞過包括防火牆等傳統安全防護。 對於面對應用層DDoS攻擊威脅的企業而言,必須克服的挑戰在於如何區分人類流量與魁儡(bot)流量。 ... Read more
0 Reviews

Is 2015 Half Empty or Half Full?

With 2015 crossing the half way point, let's take a look at some technology trends thus far. Breaches: Well, many databases are half empty due to the continued rash of intrusions while the crooks are half full with our personal information.... Read more
0 Reviews

Sometimes a Hack is Not a Hack, but We Should Still Worry

#LTEWS #Security I was at a roundtable discussion recently talking about security in the mobile carrier networks. During the discussion the recently announced SS7 signaling hack was introduced as an example. I would propose that this vulnerability... Read more
0 Reviews

Configuring Decision Logging for the F5 BIG-IP Global Traffic Manager

I was working on a GTM solution and with my limited lab I wanted to make sure that the decisions that F5 BIG-IP Global Traffic Manager made at the wideIP and pool level were as evident in the logs as they were consistent in my test results. It... Read more
Average Rating: 4.9
4 Reviews

IoT Effect on Applications

As more applications are needed to run those Things, traditional infrastructure concerns like scale and reliability will become paramount. Additional challenges with identity and access, improving the user experience, and the need for faster... Read more
0 Reviews

DNS Interception: Protecting the Client

Introduction Everything starts with a DNS request. So why not use it to protect the client? With the recent addition of Secure Web Gateway Services to the F5 line up of modules in TMOS 11.5, it provided the ability to access a URL Categorization... Read more
Average Rating: 4.9
4 Reviews

Mitigating Unwanted Communication On Your Service Network

With so many new and varied devices such as smartphones, smartwatches, laptops, and tablets accessing a service provider network, with a 2.9 device per-person average worldwide according to a Sophos survey, it’s no wonder there is Operator... Read more
0 Reviews

Mobile Service Providers are missing a Key Security Issue - And it is not DNS

#MWC15 Barcelona is a great city, but with 100,000 people coming to the city for Mobile World Congress, it is expected that the criminals will come in force to prey upon these unwary travelers. When I travel, I am careful to protect myself from... Read more
0 Reviews

UAE IT Decision-Makers Highlight Growing Scale and Impact of DDoS Attacks

​Ahead of tomorrow's IDC CIO summit in Dubai, F5 Networks has released new survey findings highlighting UAE IT decision-makers' views on DDoS attacks. Out of 102 respondents from companies with at least 500 employees, 55% said they... Read more
0 Reviews

Intelligent DNS Animated Whiteboard

DNS will become even more important as additional sensors, monitors, actuators and other 'things' connect to the internet. It helps those devices like refrigerators and automobiles get their updates and helps us people find those things in... Read more
2 Reviews

UAE Cybersecurity Threat Landscape Growing in Intensity and Complexity

Leading UAE IT decision-makers agree that cybersecurity threats are growing in intensity and scale across the region.  According to a new survey commissioned by F5 Networks, 81% of surveyed IT decision-makers believed their organisation... Read more
0 Reviews

صناع القرار المعنيين بقطاع تقنية المعلومات في المملكة العربية السعودية يسلطون الضوء على تنامي حجم وتأثير هجمات "الحرمان من الخدمة" DDoS

سلط اليوم كبار صناع القرار في قطاع تقنية المعلومات بالمملكة العربية السعودية الضوء على تنامي خطر هجمات الحرمان من الخدمة DDoS، حيث أصبحت من أكبر المخاطر الأمنية التي يتعرض لها قطاع الأعمال على مستوى المملكة. وأظهرت نتائج الدراسة حديثة... Read more
0 Reviews

Concerned Saudi IT Decision-Makers Highlight Growing Scale and Impact of DDoS Attacks

Leading Saudi IT decision-makers have highlighted how distributed denial-of-service (DDoS) attacks are fast becoming one of the main business security risks in the Kingdom. In a new survey commissioned by F5 Networks,84% agreed that DDoS attacks... Read more
0 Reviews

آخر تطورات مشهد تهديدات الأمن الالكتروني في المملكة العربية السعودية "الهجمات أصبحت أكثر قوةً وتعقيداً من أي وقت مضى"

: أقر كبار صناع القرار في قطاع تقنية المعلومات بالمملكة العربية السعودية بأن التهديدات الالكترونية تتنامى بشدة وعلى نطاق واسع في جميع أنحاء المملكة، ما يعرض الشركات لمخاطر إصابة سمعتها ومكانتها وبنيتها الأساسية. وقد أظهرت نتائج الدراسة... Read more
0 Reviews

Saudi Cybersecurity Threat Landscape “More Intense and Complex Than Ever”

Leading Saudi IT decision-makers agree that cybersecurity threats are growing in intensity and scale across the Kingdom. The situation is putting businesses at risk of hits to both reputation and bottom line. A new survey commissioned by F5... Read more
0 Reviews

User Group Recap: Politics, Brotherly Love, and Cheesesteak

I had the unique opportunity to speak to F5 users in Washington DC and Philadelphia.   John Shin doing his thing...     Brian Van Lieu talking DNS Security...   Philadelphia User Group at Ruth's Chris Steak... Read more
1 Review

Securing the future of the telecommunications industry in Australia

Over the last 50 years, our means of communicating with one another has evolved radically through the influence of technology. From the telegram to emails, from the telephone call to over-the-top applications, the realm of communications is... Read more
0 Reviews