Remove Applications Remove Examples Remove IPv6 Remove Security
article thumbnail

Liveblog: IPv6 in the Cloud - Protocol and Service Overview

Scott Lowe

This is a liveblog of an AWS re:Invent 2017 breakout session titled “IPv6 in the Cloud: Protocol and Service Overview.” Global IPv6 adoption is currently around 22%, and is expected to hit 25% by the end of the year. T-Mobile, for example, now has 89% of their infrastructure running on IPv6.

IPv6 60
article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. All of these messages derive from the assumption that one subnet = one security zone, and therefore intra-subnet communications are not secured.

IPv6 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more.

All Things Distributed

New Route 53 and ELB features: IPv6, Zone Apex, WRR and more. allthingsdistributed.com) point to same location where for example www.allthingsdistributed.com is pointing to jump through complex redirect hoops. ELB Application Lockdown. Elastic Load Balancing support for IPV6. All Things Distributed. Comments ().

IPv6 114
article thumbnail

Technology Short Take 153

Scott Lowe

This article contains some good information on IPv6 for those who are just starting to get more familiar with it, although toward the end it turns into a bit of an advertisement. Although Linux is often considered to be superior to Windows and macOS with regard to security, it is not without its own security flaws. Networking.

Linux 74
article thumbnail

What is Passive DNS and how do you leverage it in research?

CTOvision

When a computer asks a recursive DNS server for a lookup, it will check its own cache but also frequently checks with the root name servers to make sure it knows who holds the data for the domain (in the graphic example below, the.com name server). A good way to think about DNS is to look at the contacts application on your mobile phone.

Research 150
article thumbnail

What Can You Get from an IP Address and Why is it Important?

Galido

For those who are scratching their heads, a good example of hardware that uses a data link layer is an ethernet cable. Lastly, there’s the application layer. Here’s how to tell apart the following IP addresses: IPv4 and IPv6. This is created from a lot of different kinds of protocols like: File Transfer Protocol.

IPv6 105
article thumbnail

Technology Short Take #84

Scott Lowe

I wouldn’t take this information as gospel, but here’s a breakdown of some of the IPv6 support available in VMware NSX. Yes, I know that security and privacy are different, but this seems like a reasonable place to put this article by J Metz on pseudo-anonymous e-mail. Operating Systems/Applications. Servers/Hardware.

Windows 60