Showing posts with label networking. Show all posts
Showing posts with label networking. Show all posts

Thursday, October 29, 2015

Libraries, Liberty, and The Onion Router

I like libraries. The idea of a place where anyone can read anything is a fantastic innovation in human history.

I've written about libraries before.

Since Hypatia, and possibly before, libraries were not about just books, they are places where both learning and teaching occur. Young or old, rich or poor, the idea of welcoming everyone is inherently revolutionary.

Librarians are cool, too. If you think Google is good, go talk to a librarian. They know how to find stuff!

Thursday, November 13, 2014

Real Net Neutrality

Vint Cerf
Vint Cerf:
"The Internet is based on a layered, end-to-end model that allows people at each level of the network to innovate free of any central control. By placing intelligence at the edges rather than control in the middle of the network, the Internet has created a platform for innovation."

The 'Net is made up of independent providers with private peering contracts between them. This is one of the details in the "debate" about "Net Neutrality" that tends to get lost.

Update: Wired Magazine agrees with me.
Update: The bureaucrats have finally gotten their way, and put the 'Net back under their chains. February 26, 2015
Update: One more, from the Mises Institute.

Wednesday, November 12, 2014

NeoCash Radio and The First Crypto War

NeoCash Radio has put up the short talk we had concerning the "First Crypto War", being, in my opinion, the time period from when Phil Zimmerman wrote PGP, to when the International Trafficking In Arms Regulations on the export of strong encryption were repealed.

I recommend my earlier post, "When The Net Was Young", if you haven't read it.

Spoiler: Geeks vs. NSA, Geeks won the battle, the war continues.

But there are elements to the story that I was not able to get into on the air, so I will spend a little while creating this blog post with links and additional materials concerning my comments in the radio show

Thursday, March 3, 2011

SSH, X11, and You

SSH Encrypted Network Connections


Recently I read an article where the author went through great pains to launch an application on a remote system and display it locally, over an encrypted session.


Doing this is actually far, far easier to do than ggarron makes it out to be. It's no more difficult than a single option in SSH. But first, what is SSH to you?


Right off the bat, please, don't fear the command line. If you're new to UNIX style systems, like Linux, the command line can seem daunting. It just sits there waiting for you to type something. Don't let it bother you, as long as you're not root you can't do much harm.


The logo of OpenSSH
Secure Shell is a command line application that allows you to replace telnet, ftp and xhost with a secure link to a remote system with serious protection of the data you transfer.


SSH uses passwords, or can be configured to use Public Key encryption, like GunPG or PGP do. Passwords can work into a system the first time, Public Key authentication has to be set up ahead of time.


For a good SSH primer, if you don't have a "Unix Power Utilities" volume sitting around, this article on WikiHow.com seems quite straight forward. There are lots of results if you use Google to look for "ssh howto", and I've noticed that the Ubuntu forums tend to cater well to "first time users". The OpenSSH.com Frequently Asked Questions list gets rather technical. 

Friday, February 11, 2011

A simple explanation of home networking.

I've been asked by a friend to do a primer on what I could term "Home Networking". That is, as much as possible simple plug and play by people who are not, and have no interest in, running things like web servers or mail servers.

Let me introduce to you, The Router:

Some people connect their computer directly to their ISPs hardware, be it by cable, DSL or sometimes even dial-up, whwhere their system acquires a unique IPv4 address and becomes directly reachable to the world. Without robust security on that system, it will get cracked.

This is where a router belongs, between the big bad outside world, and your nice, comfortable, warm and friendly local area network, even if that is just one PC. Here's what mine looks like:


Monday, February 7, 2011

Negative aspects of IPv6?

I was reading the comments on LinuxToday.com about an article on the costs of transitioning the world to IPv6 from the present ubiquity of IPv4.

http://www.linuxtoday.com/it_management/2011020701435NWNT

As a network engineer I've often considered this, and have come up with various combinations of tunneling, smart routers, transitional gateways and such to "solve" possible problems. The fact is that no one entity is ever going to fund the re-engineering of every IP capable device in the world all at once. And a Linux powered router can easily act as a gateway between legacy IPv4 hardware on the user side and an IPv6-only "world". So the transition need be neither overwhelming nor even extraordinarily expensive, and it can be accomplished as quickly as people choose to do it.

But for a moment, I would like to explore the problems that Rainer Weikusat, GaAsP, Golodh, Bernard Swiss and Ken Jennings, as of my writing this, have brought up. And of course, any of my own consideration that might arise.