Printer Friendly

News- Cisco scales data center fabrics more than 12,000 10GbE server ports.

As Internet traffic Internet traffic is the flow of data around the Internet. It includes web traffic, which is the amount of that data that is related to the World Wide Web, along with the traffic from other major uses of the Internet, such as electronic mail and peer-to-peer networks.  volumes increase at exponential rates (by 2013 it's predicted that there will be 56 exabytes (about 12.8 billion online movies) crossing the internet per month) the data centers that house and secure applications and data need to scale while remaining highly secure. Cisco[R] recently introduced additions to its data center networking portfolio that address these needs and deliver unmatched architectural flexibility and scale for physical, virtual or cloud computing (1) Running applications in or from network servers. Computing "in the cloud" may refer to a company's own network, but often refers to the Internet and the use of Web browser-based or rich client applications.  environments. The new Cisco switching products augment the Cisco Unified Fabric portfolio, which consists of Nexus data center switches and MDS MDS,
n See temporomandibular pain-dysfunction syndrome.

MDS 1 Maternal deprivation syndrome, see there 2 Myelodysplastic syndrome, see there
 storage switches that connect servers, data storage, and corporate networks seamlessly within the data center and cloud. Cisco unveiled second generation capabilities for the Nexus 7000 family and Cisco FabricPath support for the Nexus 5500 switch; together they provide a new data center fabric scalability, supporting over 12,000 10GbE server ports: double the next-best offering on the market at less than half the cost. Cisco also added new switches with sub-microsecond latency to the Nexus 3000 ultra-low latency switching family, and introduced a virtualized version of its ASA Asa (ā`sə), in the Bible, king of Judah, son and successor of Abijah. He was a good king, zealous in his extirpation of idols. When Baasha of Israel took Ramah (a few miles N of Jerusalem), Asa bought the help of Benhadad of Damascus and  security appliance Security appliances protect computer networks from unwanted data traffic, intruders, email spam, enforce policies, and may also be used to create and manage VPNs. There are a number of types of security appliances.  to deliver consistent security for virtualized and cloud environments.

The announcements advance Cisco's fabric-based approach to delivering solutions to meet diverse data center requirements, from non-virtualized "bare metal 1. bare metal - New computer hardware, unadorned with such snares and delusions as an operating system, an HLL, or even assembler. Commonly used in the phrase "programming on the bare metal", which refers to the arduous work of bit bashing needed to create these basic tools " environments, to highly virtualized data centers, Cloud-based architectures, Web 2.0 and "Big Data" environments that manage huge data sets. www.cisco.com.

Symantec Intelligence Report

Symantec Corp recently announced the results of the October 201 I Symantec Intelligence Report. This month's analysis reveals that for the first time, spammers have established a genuine URL shortening service that is publically available and will generate real shortened links. These have so far only been found in spam emails. October Intelligence reports shows spammers using open source URL shortening scripts to operate malicious sites http://bit.ly/o27jGg

During 2010, 92% of spam emails contained URLs and the use of shortened links makes it harder for traditional anti-spam countermeasures to block the messages based on fingerprinting the URL URL
 in full Uniform Resource Locator

Address of a resource on the Internet. The resource can be any type of file stored on a server, such as a Web page, a text file, a graphics file, or an application program.
. Legitimate services are much quicker to respond to abuse, and spammers are preying on the knowledge that many people are familiar with shortened links through their use in social media, and have developed a false sense of security about them.

Symantec Intelligence reported earlier this year that spammers had set up their own URL shortening services to better conceal their spam sites and make them harder to block. This month's analysis indicates that a spam gang with at least 80 URL shortening sites have been operating, all using a similar naming pattern, and used the.info top-level domain. However, unlike the URL shortening sites uncovered earlier this year, these sites are effectively public URL shortening sites. Anyone can create a shortened URL on these sites; the form to do so is also publically available.

"Spammers are using a free, open source URL shortening scripts to operate these sites. After creating many shortened URLs with their own service, the spammers then send spam including these URLs. These particular spammers use subjects designed to attract attention, like 'It's a long time since I saw you last!,' 'It's a good thing you came' and so on. This is a common social engineering tactic, and is designed to arouse curiosity, particularly if they have a false sense of security around the safety of shortened links," said Paul Wood, Senior Intelligence Analyst, Symantec.cloud.

"It is possible that spammers are setting up their own URL shortening sites since legitimate URL shortening sites, which have long suffered with abuse, have slightly improved their detection of spam and other malicious URLs." www.symantec.com.
COPYRIGHT 2011 A.P. Publications Ltd.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2011 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:SECURITY SUPPLEMENT
Publication:Database and Network Journal
Date:Dec 1, 2011
Words:607
Previous Article:2011 is proving that PCI DSS is working; however there are challenges to be overcome.
Next Article:Online social networks - launch pads for Malware.
Topics:

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters