Tag Archives: connected

Huawei MT992 Modem for G.fast

I’ve recently been connected to G.fast or BT Ultrafast.

Long story short, BT now supplies a ‘Super Hub’ rather than a modem and Home Hub. But the Super Hub isn’t so super…

Therefore, whilst I’m still in my cooling off period, I’m hoping someone might have a Huawei MT992 G.fast modem they’re will to part with? If so, I’d love to hear from you!

Or perhaps you may know a BT Engineer who could get hold of one for me?

Any help welcome! Thanks.

Location: Swindon…

Huawei MT992 Modem for G.fast

Huawei MT992 Modem for G.fast

I’ve recently been connected to G.fast or BT Ultrafast.

Long story short, BT now supplies a ‘Super Hub’ rather than a modem and Home Hub. But the Super Hub isn’t so super…

Therefore, whilst I’m still in my cooling off period, I’m hoping someone might have a Huawei MT992 G.fast modem they’re will to part with? If so, I’d love to hear from you!

Or perhaps you may know a BT Engineer who could get hold of one for me?

Any help welcome! Thanks.

Location: Swindon…

Huawei MT992 Modem for G.fast

A series of new IoT botnets plague connected devices

Internet of things botnets continue to plague connected devices with two new botnets appearing this week.

The first of the IoT botnets causing trouble was discovered by security researchers at Bitdefender and is called Hide ‘N Seek, or HNS. HNS was first noticed on January 10, “faded away” for a few days and then reemerged on January 20 in a slightly different form, according to Bitdefender senior e-threat analyst Bogdan Botezatu. Since then, HNS — which started with only 12 compromised devices — had amassed over 32,000 bots worldwide as of January 26. Most of the affected devices are Korean-manufactured IP cameras.

“The HNS botnet communicates in a complex and decentralized manner and uses multiple anti-tampering techniques to prevent a third party from hijacking/poisoning it,” Botezatu explained in his analysis of HNS, also noting that the bot can perform device exploits similar to those done by the Reaper botnet. “The bot embeds a plurality of commands such as data exfiltration, code execution and interference with a device’s operation.”

Botezatu also explained that HNS works sort of like a worm in that it uses a randomly generated list of IP addresses to get potential targets. The list of targets can be updated in real time as the botnet grows or bots are lost or gained. Luckily, like other IoT botnets, the HNS “cannot achieve persistence” and a device reboot will remove it from the botnet.

“While IoT botnets have been around for years, mainly used for DDoS attacks, the discoveries made during the investigation of the Hide and Seek bot reveal greater levels of complexity and novel capabilities such as information theft — potentially suitable for espionage or extortion,” Botezatu said.

Unlike other recent IoT botnets, HNS is different from the infamous Mirai malware, and is instead similar to the Hajime botnet. Like Hajime, HNS has a “decentralized peer-to-peer architecture.”

The Masuta botnets

Two other new botnets on the scene do show similarities to Mirai, however.

The Masuta and PureMasuta variant were discovered by researchers at the company NewSky Security and appear to be the work of the Satori botnet creators. The Satori botnet targeted Huawei routers earlier this month, and the Masuta botnets now also target home routers.

According to the research from NewSky Security, Masuta shares a similar attack method with Mirai and uses weak, known or default credentials to access the targeted devices. PureMasuta is a bit more sophisticated and exploits a network administration bug uncovered in 2015 in D-Link’s Home Network Administration Protocol, which relies on the Simple Object Access Protocol to manage device configuration.

“Protocol exploits are more desirable for threat actors as they usually have a wider scope,” Ankit Anubhav, principal researcher at NewSky Security, wrote in the analysis of the botnets. “A protocol can be implemented by various vendors/models and a bug in the protocol itself can get carried on to a wider range of devices.”

PureMasuta has been infecting devices since September 2017.

In other news

  • Kaspersky Lab filed a preliminary injunction as part of its appeal against the U.S. Department of Homeland Security’s ban on the use of the company’s products in government agencies. The ban was originally issued in September 2017 in response to concerns that the Moscow-based security company helped the Russian government gather data on the U.S. through its antivirus software and other products. The ban, Binding Operational Directive (BOD) 17-01, was reinforced in December 2017 in the National Defense Authorization Act, despite offers from Kaspersky to have the U.S. government investigate its products and operations. In response to the National Defense Authorization Act, Kaspersky Lab filed a lawsuit against the U.S. government saying that the ban was unconstitutional. As part of the lawsuit, the injunction would, for now, stop the government ban on BOD 17-01.
  • The PCI Security Standards Council (PCI SSC) published new security requirements for mobile point-of-sale systems. The requirements focus on software-based PIN entry on commercial off-the-shelf (COTS) mobile devices. Requirements already exist for hardware-based devices that accept PINs, so these standards expand on them. The so-called PCI Software-Based PIN Entry on COTS (SPoC) Standard introduces a “requirement for a back-end monitoring system for additional external security controls such as attestation (to ensure the security mechanisms are intact and operational), detection (to notify when anomalies are present) and response (controls to alert and take action) to address anomalies,” according to PCI SSC CTO Troy Leach. The standard consists of two documents: the Security Requirements for solution providers, including designers of applications that accept PINS; and the Test Requirements, which “create validation mechanisms for payment security laboratories to evaluate the security” of the PIN processing apps. The SPoC security requirements focus on five core principles, according to Leach:
    • isolation of the PIN from other account data;
    • ensuring the software security and integrity of the PIN entry application on the COTS device;
    • active monitoring of the service, to mitigate against potential threats to the payment environment within the phone or tablet;
    • Required Secure Card Reader for PIN (SCRP) to encrypt and maintain confidentiality of account data; and
    • transactions restricted to EMV contact and contactless.
  • Alphabet, best known for being Google’s parent company, launched a new cybersecurity company — Chronicle. Chronicle is an offshoot of the group X and will be a stand-alone company under Alphabet. Former Symantec COO Stephen Gillett will be the company’s CEO. Chronicle offers two services to enterprises: a security intelligence and analytics platform and VirusTotal, an online malware and virus scanner Google acquired in 2012. “We want to 10x the speed and impact of security teams’ work by making it much easier, faster and more cost-effective for them to capture and analyze security signals that have previously been too difficult and expensive to find,” Gillett said in a blog post announcing the company launch. “We are building our intelligence and analytics platform to solve this problem.” The announcement did not provide many specifics, but the launch could pose a significant threat to cybersecurity vendors that do not have access to the same resources as a company with the same parent as Google.

Intelligent Retail

At NRF Microsoft will showcase connected solutions for customer engagement, workforce empowerment, operational insights, and business transformation that combine the excitement of the latest innovations around Artificial Intelligence, Mixed Reality, Internet of Things & Blockchain technologies with the trust of the industry’s most reliable and secure platform. Together with our customers and partners, Microsoft is building the future of intelligent retail.

From digital experiences that make shopping fun and rewarding, to the productivity and collaboration solutions that allow retail employees to provide outstanding customer service, to the intelligent systems that provide deep insights and empower advanced decision making and personalization. Microsoft is transforming the future of retail by empowering people throughout the shopping experience. 

Questions? Contact us here.

Booth Tours:

Thank you for your interest in a booth tour with Microsoft at NRF 2018 in New York, New York.

Join us on a Booth Tour. Explore our latest and greatest industry solutions and hear firsthand stories of innovation from your industry peers as to how they are transforming their business. Booth Tours are 45 minutes in length, and are first-come, first-served – complete the request form below to secure your spot.

Booth Tours

Request 1:1 Briefing:

Do you have a specific business challenge or topic you’d like to discuss with a Microsoft executive? Then let’s meet one on one. We’ll take the time to understand your business and demonstrate the significant ways Microsoft can help you realize your potential.

Please click on the link below and complete the information as thoroughly as possible so we may assign an appropriate Microsoft representative to meet with you.

1:1 Briefing

Startup Showcase:

The extremely popular Microsoft NRF Startup Showcase is back for 2018! This exclusive, invitation-only event will host more than a dozen disruptors in retail technology. Please contact your account executive directly to RSVP. Each company will showcase select solutions that help retailers and brands to thrive in today’s competitive environment. Major global retailers have credited the 2017 event with inspiring fresh, strategic conversations around reimagining retail. These engagements will be hosted at the Microsoft 5th Avenue Flagship Store and has a capacity of 40 guests per event. Please note: unless previously arranged, we are unable to offer private showcase events for individual customer accounts.

Sunday, January 14 | 4:00PM-6:00PM
Monday, January 15 | 4:00PM-6:00PM
Tuesday, January 16 | 4:00PM-6:00PM
Wednesday, January 17 | 4:00PM-6:00PM

Please contact your account executive directly to RSVP.

Get a FREE pass:

Are you a retailer? Retailers are eligible for FREE passes to the event. Register for your pass here by entering your company name, email address and the Microsoft Customer referral code below.

Code: 831

Having trouble registering? Your company might not have a membership with NRF. Non-members are still eligible for a pass, but will need to contact nrfconcierge@nrf.com for assistance.

Use SCVMM to diagram VM network connectivity

host were commonly all connected to a single virtual switch, which was tied to a physical network interface card or network interface card team.

Over time, however, virtualized networks have become far more complex. No longer is it the norm for VMs to share a single, common virtual network. Instead, a virtualized infrastructure might contain any number of physical, virtual, logical or software-defined networks.

Of course, this increased complexity can sometimes make life difficult, especially when troubleshooting is required. Thankfully, System Center Virtual Machine Manager (SCVMM) contains native tools to help administrators make sense of the often complex VM network web. Better still, these tools are really easy to use — if you know where to find them.

Create a VM network diagram

The easiest way to view VM network connectivity is to open the SCVMM console and then go to the VMs and Services workspace. From there, right click on the VM you wish to examine, and then choose the Connect or View > View Networking commands from the resulting shortcut menus. You can see what this looks like in Figure A.

Connect or View > View Networking commands”/><figcaption><i class=Figure A. Choose the Connect or View > View Networking commands from the shortcut menu.

At this point, you’ll be taken to a screen that is similar to the one in Figure B, below. As you can see, this screen shows the VM name and the name of the virtual switch to which the VM is connected. At first, this screen might seem minimally helpful. After all, you can easily get this information from the VM’s settings screen or PowerShell. However, there’s more going on here than meets the eye.

Network diagram
Figure B. This is a simple network diagram.

If you look at the figure above, you’ll notice that the toolbar contains several different icons, and that, currently, the VM Networks icon is selected. Clicking the Host Networks icon causes System Center to display a completely different view of the networking resources.

As you can see in Figure C, the Host Networks view displays the virtual switches that exist on a host and the physical network interface controllers (NICs) to which the virtual switches are attached. The diagram also shows the relationship between VM networks and logical networks.

Host Networks view
Figure C. The Host Networks view displays virtual switches and physical NIC connections.

The Network Topology view, which you can access by clicking on the Network Topology icon, displays a higher level view of the relationship between VM networks and logical networks. You can see an example of this in Figure D.

Network Topology view
Figure D. The Network Topology view shows a higher level view of this relationship.

Of course, my lab environment is really simple, but in the case of a more complex environment, these diagrams can become somewhat cluttered. If necessary, you can reduce some of the clutter — and customize the look of your diagram — by using the plus and minus signs to expand or collapse various parts of the diagram.

Oh, and in case you are wondering, even though I’ve created these diagrams using a VM as a starting point, you aren’t limited to creating diagrams in this way. You can use the SCVMM console to create network diagrams from other levels of the infrastructure. For example, when I create a diagram from a host server, the diagram displays all of the VMs that are connected to the host’s virtual switch, as shown in Figure E.

VM diagram
Figure E. This diagram was created at the VM host level.

Export the VM network diagram to Visio

As helpful as it might be to have a graphical diagram of your VM network, SCVMM has one more feature that’s worth mentioning.

If you look back at Figure B, you’ll notice that the upper left corner of the screen capture contains an icon that looks like a down arrow — the icon is located just above the Select Objects icon. Clicking on this icon reveals an option to export the diagram to Microsoft Visio. From there, you can print, edit or modify the diagram as needed.

For Sale – Antec P50 Case

Antec P50 case

Fan controls at top of case currently not connected would need to be rewired.

£30 including carriage
£25 for collection

Price and currency: £30
Delivery: Delivery cost is included within my country
Payment method: Bank Transfer or PPG
Location: Hove, East Sussex
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

IT Nation 2017: ConnectWise sets sights on a ‘connected ecosystem’

ORLANDO — ConnectWise has revealed a vision for a broad and connected ecosystem of third-party technology vendors that will plug into its PSA software.

At its IT Nation 2017 conference this week, the professional services automation (PSA) software provider discussed its push to bring a seemingly infinite variety of vendor integrations to ConnectWise partners through an upcoming Developer Kit. ConnectWise also highlighted its recent partnership with Cisco to make it easier for partners to use several Cisco technologies within its PSA software. ConnectWise currently integrates with about 200 vendors.

“The whole message [of IT Nation 2017] is really that of choices in the ecosystem, and then, ‘Let’s do more of that. Let’s connect the entire ecosystem,'” said Arnie Bellini, co-founder and CEO of ConnectWise.

Cisco integration

At last week’s Cisco Partner Summit, ConnectWise unveiled the pilot program for ConnectWise Unite, a new offering that lets Cisco partners use Cisco Spark, Meraki, Umbrella and Stealthwatch through the ConnectWise management console. In addition to Amazon Web Services, ConnectWise previously integrated with Microsoft Office 365 and Azure through its CloudConsole product, which Bellini said will be merged with Unite in the first quarter of 2018.

Cisco technologies available under Unite will eventually expand, according to Nirav Sheth, vice president of solutions, architectures and engineering for the global partner organization at Cisco. “We definitely have some cloud-managed assets that we are also exploring to continue to evolve and have more offers enabled by the Unite platform,” he said.

Additionally, ConnectWise Unite will expand with other vendors, including Google, which Bellini said “is a perfect additional integration that we think will help drive more value for Cisco.” Google and Cisco announced a partnership around hybrid cloud at the Cisco Partner Summit.

The Cisco-ConnectWise partnership serves a means for Cisco to grow its market share in the small and medium-sized business (SMB) space, Sheth said, noting that Cisco is trying to change the perception that it is a vendor focused solely on the enterprise segment. This means working more closely with ConnectWise partners such as managed services providers (MSPs) that generally target SMB customers.

Cisco and ConnectWise plan to roll out MSP University, an enablement program for Cisco value-added resellers to expand into managed services. “We have committed to working with Cisco to create an amazing university that helps get Cisco partners started down the path of managed services,” Bellini said. He added that all ConnectWise partners will have access to MSP University as well.

Integrations ahead: The Developer Kit

ConnectWise has several releases on the integration front slated for 2018, the company revealed. Among these is the Developer Kit, a tool for development teams to connect products to the ConnectWise platform. The Developer Kit has a tentative launch date for the second quarter of 2018.

“The idea on the ConnectWise Developer Kit is … [to] make every solution available to our partners and … put it in one pane of glass … so they can manage it and monitor it and bill it,” Bellini said.

Bellini noted the company has put together a $10 million fund to support the Developer Kit initiative. Using the fund, which is provided through ConnectWise Capital, ConnectWise will act as an “angel investor,” investing in ideas that further connect the ecosystem, Bellini said. ConnectWise is looking to increase that fund to $25 million, he said.

Another unique feature of the Devloper Kit is that it allows channel partners to build their own integrations and customize their own experience in the ConnectWise platform without the need of development expertise. “If you want to develop with SDKs and APIs, we still have that, but we are making it easier,” said Craig Fulton, chief product officer at ConnectWise.

Gavin Gamber, vice president of channel sales and alliances, said ecosystem expansion has become a major initiative for ConnectWise leadership, driven by partner demand. Partners “are our best gauges on where we should be heading. … That’s how a lot of these integration partners pop up.”

He added that there are virtually no limits on how large the ConnectWise ecosystem could grow. “The ecosystem is just getting bigger and bigger and bigger,” he said. With a large ecosystem of integrated partners to balance, he said there are “certainly sensitivities” pertaining to ConnectWise’s competing vendor partners, but “it all boils down to who has got the best solutions for the partner and fits their needs the best at a price that they like and is affordable.”

ConnectWise software enhancements

At the IT Nation 2017 keynote presentation, ConnectWise showcased upcoming features of the ConnectWise suite, often to the applause of conference attendees.

ConnectWise Automate, the company’s automating tool, is being moved to the web and more tightly integrated with ConnectWise Manage. New web-based functions will include a computer management function and network map feature, slated for availability in the first quarter of 2018.

ConnectWise Automate “has been a tool you need to install on a Windows machine. Now we’re taking it to the web so you can now use it from any browser,” Fulton said.

Adding to remote control functionality, ConnectWise Perspective will provide a smartphone video connection between customers and technicians, available in the second quarter of 2018. Using the feature, customers can send a live video feed from their smartphones to technicians, creating an additional layer to a partner’s service delivery capabilities. Perspective will contain features for auto-scanning barcodes, recording session time and adding workstation information into tickets, ConnectWise said.

After Fulton demonstrated Perspective onstage during his IT Nation 2017 keynote presentation, he said he was surprised by the audience response to the upcoming feature. “I wasn’t sure how that was going to go, but man, that was the biggest applause. A lot of people approached me and said … ‘Now I can see what [customers] are seeing.'”

Aligning IT with business still a struggle for enterprises

One of the very first telephone networks to exist in the United States connected 19th century farmers and homesteads with barbed wire. Predating the invention of the telephone in the 1870s, barbed wire sprawled across the prairie as landowners built their homes, and it was able to conduct signals that allowed far-flung and isolated families to talk to one another and feel like they belonged to a community.

The barbed wire telephone system had its challenges, not least of which was stampeding cattle knocking it down. But the people who built it understood a fundamental truth that technology, to be successful, must also support their business need, in this case, to bring people together.

In this issue of Network Evolution, a similar theme of aligning IT with business needs runs throughout. Here, we focus on three critical areas: hardware management, enabling unified communications (UC) and the integration of network management and security.

The hardware underpinning enterprise networks in 2017 has come a long way from barbed wire. Today, for example, more organizations are comfortable putting applications and network functions in the cloud. But deciding what stays on-premises and what goes to the cloud requires communication, and aligning IT with business units, to determine what’s best for the organization.

The call for alignment is not new. The Information Technology Infrastructure Library framework (ITIL) on IT governance to accomplish aligning IT with the business was first established in the 1980s. Now in its third version, ITIL v3 focuses on integrating IT services into all business units.

ITIL v3 itself is a decade old, which means the concept of IT as a business enabler took root well before the unified communications and collaboration market really took off. And yet, IT managers still don’t always know which UC applications are on the network, and enterprise users are unsure which collaboration tools really help them complete the work most important to the organization.

Security could very well be the most important area where aligning IT with business needs is critical. As network attacks continue to increase, network and security teams must possess a singular vision to protect the system, users and information. Yet the two departments more often work in siloes without understanding the roles each performs.

Education is one way for network professionals to understand the importance of aligning IT with business. In this month’s Subnet, one network specialist explains his journey of continuing education and its impact on his career development and why that journey never really stops.