Jump to content

Search the Community

Showing results for tags 'routers'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General
    • General Discussion
    • Artificial Intelligence
    • DevOpsForum News
  • DevOps & SRE
    • DevOps & SRE General Discussion
    • Databases, Data Engineering & Data Science
    • Development & Programming
    • CI/CD, GitOps, Orchestration & Scheduling
    • Docker, Containers, Microservices, Serverless & Virtualization
    • Infrastructure-as-Code
    • Kubernetes & Container Orchestration
    • Linux
    • Logging, Monitoring & Observability
    • Security, Governance, Risk & Compliance
  • Cloud Providers
    • Amazon Web Services
    • Google Cloud Platform
    • Microsoft Azure

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


LinkedIn Profile URL


About Me


Cloud Platforms


Cloud Experience


Development Experience


Current Role


Skills


Certifications


Favourite Tools


Interests

Found 4 results

  1. With a price tag of $279, the Velop Micro is about $100 more expensive than similar Wi-Fi 6 mesh routers and priced close to Wi-Fi 6E mesh routers. View the full article
  2. Thousands of old, outdated Asus routers are being targeted by a new version of “TheMoon” malware botnet, turning them into a network of devices used by a criminal residential proxy service. Researchers from Black Lotus Labs claim the campaign started in early March 2024 and within 72 hours, compromised roughly 6,000 Asus routers. These routers are older and past their end-of-life date, prompting the researchers to speculate that the hackers were most likely abusing a known vulnerability to deploy the malware. Becoming Faceless While Asus routers do make up the majority of the infected devices, they’re not the only ones. Black Lotus says that roughly 7,000 new endpoints are being added to the botnet every week. They are located all over the world, so no specific geography seems to be preferred. Other methods of breaching the devices include brute-force attacks and credential stuffing. Once the devices are infected, they become part of the Faceless proxy service, a known dark web tool that hackers use to hide their online activities, BleepingComputer explained. Among the groups using Faceless are IcedID and SolarMarker. "Through Lumen's global network visibility, Black Lotus Labs has identified the logical map of the Faceless proxy service, including a campaign that began in the first week of March 2024 that targeted over 6,000 ASUS routers in less than 72 hours," Black Lotus explained. Threat actors interested in Faceless’ services can only pay with cryptocurrencies, and do not require to verify their identities. What’s more, they keep their infrastructure a secret by having each device communicate with just one server, for as long as it’s infected. A third of infections last more than 50 days, while roughly 15% get eliminated within two days. The best way to defend against these threats is to make sure your routers are always updated and that they have a strong password. More from TechRadar Pro What is a residential proxy? Here’s everything you need to knowHere's a list of the best firewalls around todayThese are the best endpoint security tools right now View the full article
  3. Switches and routers are both critical components of networking infrastructure, but they serve different functions within a network. Understanding the difference between them is fundamental to grasping how networks handle data and connect devices. Here’s a comparison highlighting their primary differences: 1. Functionality: Switches are networking devices that connect multiple devices together on a Local Area Network (LAN). They operate at the data link layer (Layer 2) of the OSI model and use MAC addresses to forward data to the correct device within the LAN. Routers connect multiple networks together, such as a LAN to a Wide Area Network (WAN) or two LANs. They operate at the network layer (Layer 3) and use IP addresses to route data between networks, making decisions based on the most efficient path for data to travel. 2. Network Segments: Switches create a single network segment and work within a single network to manage and switch data packets among connected devices. Routers are used to segment and organize the network into different broadcast domains, preventing broadcasts from reaching every part of the network, which increases efficiency and security. 3. Traffic Handling: Switches handle traffic within the same network. They can significantly increase a network’s efficiency by sending data only to the intended recipient device within the LAN. Routers handle and direct outgoing and incoming traffic between different networks, managing data packets among devices that might not be on the same network. 4. Performance: Switches can enhance performance within a LAN by reducing unnecessary data transmission through packet switching, which sends data directly to the device it’s addressed to. Routers can affect the performance of a network based on the route it chooses for data packets. Advanced routing algorithms help in optimizing the speed and efficiency of data transmission across networks. 5. Security: Switches offer some level of security by segregating traffic between devices within the LAN. Managed switches provide advanced features like VLANs which can be used to further segment and secure the network. Routers play a significant role in network security. They can provide firewall protection, filter traffic, and perform network address translation (NAT), which hides the IP addresses of devices on a local network from the outside world. 6. Use Cases: Switches are used to build a network infrastructure within a home, office, or any establishment requiring multiple devices to connect within a single LAN. Routers are essential for connecting a LAN to the internet or other LANs, making them indispensable for any network that needs access to external networks. Switches vs Routers FeatureSwitchRouterArea of ExpertiseConnects devices within a single networkConnects multiple networksData Delivery MethodUses MAC addressesUses IP addressesOSI Model LayerLayer 2 (Data Link Layer)Layer 3 (Network Layer)FunctionDirects data packets to specific devicesRoutes data packets between different networksAnalogyMailroom sorter within a buildingPost office sending mail to different locationsConnectivityUsually wiredWired or wirelessRouting TableNoYesServicesLimited (e.g., basic security)More advanced (e.g., NAT, QoS)CostTypically less expensiveTypically more expensive The post Networking Fundamental: Difference between Switches & Routers appeared first on DevOpsSchool.com. View the full article
  4. The number of devices exposing the web UI on the internet, a timeline and technical details about this malicious activity, and tips for mitigating this zero-day threat are featured.View the full article
  • Forum Statistics

    43.3k
    Total Topics
    42.7k
    Total Posts
×
×
  • Create New...