Welcome to DevCentral

 

Featured Articles

Optimizing the CVE-2015-1635 iRule

A couple days ago an iRule was published that mitigates Microsoft’s HTTP.sys vulnerability described in CVE-2015-1635 and MS15-034. It’s a short rule, but it features the dreaded regex. Every time I get the chance at user groups, conferences,...

F5 Synthesis: Delivering Web Application Security in the Cloud as a Service

Web application security. Everyone knows how important it is (and if they don't, they should) and yet the complexity of managing services that provide it often result in, shall we say, less than holistic coverage of applications. At least tha...

DNS Interception: Protecting the Client

Introduction Everything starts with a DNS request. So why not use it to protect the client? With the recent addition of Secure Web Gateway Services to the F5 line up of modules in TMOS 11.5, it provided the ability to access a URL Categorization...

DevOps 101 - A Brief History Of Time

If you have anything to do with developing products or working in IT helping to deploy and run them, chances are you have heard the term "DevOps" in one form or another. Just like the ubiquitous "Cloud" floating out in the Internet somewhere, DevOps has become a catch-all phrase for anything that is Developer or Operations related.

Recent Articles

RSA 2015 - F5 BIG-IP, Cisco ASA and Cisco ACI Service Insertation Presentation

Come to RSA and check out the F5 booth at RSA this week.  We have a presentation and demo that goes over how F5 has teamed up with Cisco ACI and ASA to provide more secure and avaliable Applications using service integration. Come and check it out. Secure And Available Application Services Through F5 BIG-IP, Cisco ASA and Cisco ACI

RSA2015 – Find F5

Sporting the crisp F5 ‘Defend the New Perimeter’ t-shirt, I show you how to find F5 booth 1515 at RSA 2015 in 17 paces or less. The theme this year is Change – Challenge today’s security thinking and with the mobile revolution, applications delivered from hybrid environments and the shifting perimeter, changing your security thinking today will help protect your business applications...

Cloudy with a Chance of Security

We found all manner of interesting practices and trends as it relates to cloud and security in our State of Application Delivery 2015 report. One of the more fascinating data points was a relationship between security posture and cloud adoption. That is, it appears that the more applications an organization migrates to the cloud, the less strict its security posture becomes. Really. I was ...

F5 Friday: App Proxy or ADC?

Choosing between BIG-IP and LineRate isn't as difficult as it seems.... Our recent announcement of the availability of LineRate Point raised the same question over and over: isn't this just a software-version of BIG-IP? How do I know when to choose LineRate Point instead of BIG-IP VE (Virtual Edition)? Aren't they the same?? No, no they aren't. LineRate Point (and really Line...

Optimizing the CVE-2015-1635 iRule

A couple days ago an iRule was published that mitigates Microsoft’s HTTP.sys vulnerability described in CVE-2015-1635 and MS15-034. It’s a short rule, but it features the dreaded regex. Every time I get the chance at user groups, conferences, webinars, I preach the evils of regex on the data plane. One of the many reasons it is not the best choice is that just calling the regex engine is the...

Node.js ABC’s - E is for Events

Node.js has it's basis in asynchronous programming. Also known as Event-driven programming, asynchronous development gives the programmer a way to write a program in such a way as to not block the progress of the program while waiting for a long-lived task to complete.  Input/Output processing for local resources such as file system access or for remote network based content such as...

RSA 2015 - The Preview Video

I give a preview of RSA 2015, running April 20 – 23 in San Francisco’s Moscone Center. F5 will showcase a number of solutions that help organizations defend against the threats to their data and protect the perimeter. Visit us in Booth 1515 to learn about solutions like our Silverline Cloud based WAF and DDoS protection, along with secure mobility, SSL Everywhere and Web Fraud Protection...

F5 Silverline: Getting the most out of your WAF

Traditional network firewalls (Layer 3-4) do a great job of preventing outsiders from accessing internal networks. But, these firewalls offer little to no support in the protection of application layer traffic.  Attack vectors today are being introduced at all layers of the network. For example, the Slowloris and HTTP Flood attacks are Layer 7 attacks...a traditional network firewall would...

Billionaires, Icons and Movie Stars – Why Geek Is Now Chic

Over the past few years we’ve seen the unstoppable rise of the geek. From popular culture to big business, the geeks have inherited the earth. They’re the billionaires, the modern day rock stars, and their many achievements have resulted in a significant change to their status in popular society. They are now often championed, given the limelight or even imitated - geek is now chic!...

F5 Predicts: Where will innovation come from in 2015?

In 2014, the charismatic leader of one of the world’s largest democracies, who won the presidency with promises of change and savvy use of social media, turned to the Internet to crowdsource his Cabinet – inviting average citizens to provide input and suggestions online. No, it wasn’t President Obama. In fact, it was President Joko Widodo of Indonesia. Surprised? Well, maybe you shouldn’t...

Recent Questions and Answers