Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology

Articles

Sort results

Managing Horizon Traffic across Multiple Data Centers with BIG-IP DNS

VMware Horizon virtual desktop clients typically use a fully qualified domain name (FQDN) when accessing desktop and application resources. More and more customers are distributing their Horizon application and desktop infrastucture to distribute... Read more
Average Rating: 4.9
4 Reviews

F5 SOC webinject Analysis

Recently several e-banking Trojans (Dyre, Cridex, and Tinba, for instance) have used script injection techniques to modify the original web page. The modification may enable the attacker to perform money transactions using victims’ credentials.... Read more
1 Review

How the cloud can improve your security solutions?

The advantage of being in this industry for a while is that you get to see first hand how things change. Mostly for the better, and usually quite quickly, too. Some of these changes have a knock-on effect on other parts of the industry. One... Read more
1 Review

How is SDN disrupting the way businesses develop technology?

While many businesses acknowledge that the benefits of SDN are too big to ignore, there are challenges to overcome, particularly with the cultural changes that it brings. Read more
2 Reviews

Getting Around the Logon/Legal Banner Issues when using APM PCoIP Proxy and Horizon

If you're using APM's PCoIP Proxy and require a logon banner, you've probably figured out that the PCoIP Proxy integration stops working when you turn on the integrated logon banner from within the Horizon Administrator. Adding to the... Read more
Average Rating: 4.9
3 Reviews

On Cloud Nine: Lucky 7 questions you have about Singapore’s journey to becoming a Smart Nation

The Infocomm Development Authority (IDA) wants to make Singapore the world’s first Smart Nation, and this vision means connecting devices, things and people to provide better quality of life in an era of mobility, urban density, aging population... Read more
0 Reviews

The Inside Scoop on VMworld 2015...

It's that time of year again for VMworld in San Franciso! This year, F5 and VMware are partnering on a few fronts to show the strength and capabilities of our partnership. First, check out the F5 and VMware Hands-on-Lab for End User... Read more
0 Reviews

The disappearance of e in e-Commerce

The day when the lower-case “e” was introduced to define the online nature of a transaction now ceases to have any meaning. In the era of application everything and the highly mobile generation, digital transactions are becoming the norm in most... Read more
0 Reviews

Deliver Resiliency and Scalability with Dell vWorkspace and F5's Local Traffic Manager

Recently, there's been some "buzz" around how to configure Dell vWorkspace components behind BIG-IP's Local Traffic Manager. A few months back, I had the opportunity to work with Stephen Yorke from the Dell vWorkspace team to put... Read more
0 Reviews

HOT OFF THE PRESSES – VMware and F5 Hands-On-Lab Now Available!

VMware and F5 are proud to announce the availability of one of the first partner-centric labs utilizing VMware’s global Hands-On-Lab infrastructure. In close collaboration with the VMware End User Computing Technical Enablement team, the VMware... Read more
2 Reviews

So, you want to use RSA SecurID with APM’s PCoIP Proxy Module…

Customers who leverage Access Policy Manager (APM) for remote access to VMware Horizon 6 (formerly known as VMware View) typically have some level of two-factor authentication (2FA) as an added layer of authentication. It’s especially important... Read more
1 Review

Billionaires, Icons and Movie Stars – Why Geek Is Now Chic

Over the past few years we’ve seen the unstoppable rise of the geek. From popular culture to big business, the geeks have inherited the earth. They’re the billionaires, the modern day rock stars, and their many achievements have resulted in a... Read more
0 Reviews

Security is no longer just an IT concern, but is behaviour changing?

If - and it’s a big if - there is a positive to the recent spate of information security headlines, then it could well be that more people will take an interest in the protection of their data and devices. There seems to have been a never ending... Read more
0 Reviews

Giving security more context

It’s that time of year again. As we head towards Christmas our minds drift towards what we’re going to be buying for our loved ones. This time of year is traditionally a big one for sales of gadgets: mobile phones, PCs, laptops and, more recently,... Read more
0 Reviews

Tinba Malware – New, Improved, Persistent

As investigated by Pavel Asinovsky, F5 SOC Malware Researcher, Tinba, also known as “Tinybanker”, “Zusy” and “HµNT€R$”, is a banking Trojan that was first seen in the wild around May 2012. Its source code was leaked in July 2014.... Read more
Average Rating: 4.9
3 Reviews

iBanking Malware Analysis

iBanking is malware that runs on Android mobile devices. It is delivered via a new variant of the computer banking Trojan Qadars, which deceives users into downloading iBanking malware on to their android device. It can be used with any malware... Read more
Average Rating: 4.9
4 Reviews

BIG-IP Cluster Upgrade summary

Below is a quick summary for BIG-IP Cluster Upgrade 1- force-offline the standby unit 2- import the  new release 3- install the new release 4- reload after installation 5- online the standby unit 6- force-standby the active unit 7-... Read more
0 Reviews

Know your cyber-attacker: profiling an attacker

I remember the days when hacking was something that people did because they could. It wasn’t quite done for fun, but people wanted to show off their computer skills. More often than not, hacking was harmless, someone broke into a system and left a... Read more
0 Reviews

SDN: An architecture for operationalizing networks

As we heard at last week’s Open Networking Summit 2014, managing change and complexity in data centers is becoming increasingly difficult as IT and operations are constantly being pressured to deliver more features, more services, and more... Read more
1 Review

F5 Anti-Fraud Solutions: Frictionless Protection for the Masses

Anti-Fraud Solutions: Why F5? In 2013, F5 Networks grew its security portfolio to include advanced Anti-Fraud services with the acquisition of the Israeli-based security company Versafe. At the RSA Conference in San Francisco this week, we have a... Read more
0 Reviews

RSA 2014: Anti-Fraud Solution (feat DiMinico)

I meet with Mark DiMinico, F5 FSE, to see how F5’s new Anti-Fraud solution works. Mark shows how F5’s advanced fraud protection offers real-time security against multiple fraud threat vectors, preventing attackers from spoofing, disabling, or... Read more
0 Reviews

Bricks (Thru the Window) and Mortar (Rounds)

...or I've been Breached. There was a time when people differentiated between stealing from a physical store and pilfering data from a network.  Throughout the years there have been articles talking about the safety/risks of shopping... Read more
0 Reviews