Back in 2015 Emma Garner was looking for a fresh challenge to push her both physically and mentally. Taking inspiration from 90s comedy Cool Runnings she decided to try out for the Royal Air Force Bobsleigh Team. The RAF compete in two-person bobsleighs crewed by a driver and brakeman. Invited to attend novice training as a brakeman at Igls in Austria, she soon found herself careening down the course on her first ever week on ice.
“I remember the anticipation the first time I was nudged off the start and the exhilaration at making it down the track first time without my novice driver crashing. Some people weren’t so lucky.”
Continue reading “Cool Runnings with Endace”
Europe got its own Sharkfest in October and the inaugural Wireshark Developer and User Conference was a great success with strong attendance from the user and developer community across Europe. Congratulations to Sharkfest Europe for a great launch to what is sure to be a fantastic annual event.
There was a great program of speakers over the three days. Kicking things off with the pre-conference course was Wireshark University’s Laura Chappell. Her Troubleshooting with Wireshark tutorial was well attended and included invaluable tips for working with Wireshark using workflows which make optimal use of Wireshark to quickly highlight potential issues.
Continue reading “Inaugural Sharkfest Europe a great success”
The new DAG 5.5.0 software release is available with some exciting and innovative new features:
Add Provenance smart data to captured packets
“Packets don’t lie – unless you don’t know where they came from.”
One of our customers said that once. And he was right.
So with DAG 5.5.0 we’re introducing a revolutionary new capability. Now you can add “Provenance” smart-data fields to your capture files and streams to provide full, contextual information about where the packets were captured and what the environment was like at the time.
Continue reading “DAG 5.5.0 software update”
On April 7, the “Heartbleed” bug was announced. It’s a serious flaw in the OpenSSL 1.0 – 1.0.1 code series which affects all applications using it for encryption. In short, it means that anyone who can connect to the server can remotely read the server’s memory – including the SSL certificate secret key, usernames and passwords, and anything else.
With the Heartbleed bug exploit code in the wild, anyone can take advantage of the critical time between public exposure of the exploit and when all organizations can patch (or take offline) vulnerable systems. So, for almost every organization in the world, there are three questions that come to mind. The first question is “which of my public facing servers is vulnerable?” The second question is “have I been exploited since this became public?” And the third question is “what have I lost?”
The EndaceProbe™ Network Recorder helps answer all three questions.
Continue reading “Are your systems safe against the Heartbleed bug?”
I don’t know about you, but the winter holiday season is a bittersweet pill for me to swallow due in part to two occurrences which are aptly named “Black Friday” and “Cyber Monday.” The connotations themselves conjure up images of sinister malevolence. Black Friday might as well be called “The Black Plague” and Cyber Monday could very well be the title for the next Terminator movie, “Cyber Monday – Rise of the Machines.” The two lexicons of retail mind-control methods are emblazoned in the pre-frontal cortex of every consumer out there…unless by chance, you have been one of the lucky few individuals who is stuck in the 1950’s and opts to buy their holiday presents from the Sears Roebuck Holiday catalog, I envy you.
Continue reading “Who needs Mixed Martial Arts (MMA) when you have Cyber Mondays?”